Update contrib.
1 // Copyright (c) 2004-2009 Nokia Corporation and/or its subsidiary(-ies).
2 // All rights reserved.
3 // This component and the accompanying materials are made available
4 // under the terms of "Eclipse Public License v1.0"
5 // which accompanies this distribution, and is available
6 // at the URL "http://www.eclipse.org/legal/epl-v10.html".
8 // Initial Contributors:
9 // Nokia Corporation - initial contribution.
16 #define __INCLUDE_CAPABILITY_NAMES__
22 #define MAX(a,b) ((a)<(b)?(b):(a))
23 #define MAX3(a,b,c) MAX(MAX(a,b),c)
24 #define MAX4(a,b,c,d) MAX(MAX(a,b),MAX(c,d))
26 //Unicode text file prefix - FE,FF bytes.
27 static const TUint16 KUcs2Bom = 0xfeff;
29 //Repository (ini) file - signature
30 _LIT(KSignature, "cenrep");
31 static const TInt KSignatureLen = 6;
33 //Repository (ini) file - version string and version number
34 _LIT(KVersion, "version");
35 static const TInt KVersionLen = 7;
36 static const TUint KCurrentVersion = 1;
38 //Repository (ini) file - supported types names
39 _LIT(KTypeInt, "int");
40 _LIT(KTypeReal, "real");
41 _LIT(KTypeString, "string");
42 _LIT(KTypeString8, "string8");
43 _LIT(KTypeBinary, "binary");
45 //Max type name length
46 static const TInt KMaxTypeLen = 9;
48 //The symbol used in repository (ini) files to note null data
49 static const TChar KNullDataIndicator = '-';
51 // Section identifiers in the repository (ini) file
52 _LIT(KPlatSecSection, "[platsec]");
53 static const TInt KPlatSecSectionLen = 9;
55 _LIT(KOwnerSection, "[owner]");
56 static const TInt KOwnerSectionLen = 7;
58 _LIT(KTimeStampSection, "[timestamp]");
59 static const TInt KTimeStampSectionLen = 11;
61 _LIT(KMainSection, "[main]");
62 static const TInt KMainSectionLen = 6;
64 _LIT(KDefaultMetaSection, "[defaultmeta]");
65 static const TInt KDefaultMetaSectionLen = 13 ;
67 static const TInt KIniFileSectionLen = MAX4(KPlatSecSectionLen,KMainSectionLen,KTimeStampSectionLen, KDefaultMetaSectionLen);
69 // Other useful string constants
70 _LIT(KMaskString, "mask");
71 static const TInt KMaskLen = 4;
73 _LIT(KReadAccessSidString, "sid_rd");
74 _LIT(KReadAccessCapString, "cap_rd");
75 _LIT(KWriteAccessSidString, "sid_wr");
76 _LIT(KWriteAccessCapString, "cap_wr");
77 _LIT(KAccessAlwaysPass, "alwayspass");
78 _LIT(KAccessAlwaysFail, "alwaysfail");
79 // could do max of _LITs above
80 static const TInt KMaxAccessTypeLen = 6;
82 // longest capability string from CapabilityNames is 15
83 static const TInt KMaxCapabilityStringLen = 20;
85 static const TInt KBufLen = MAX3(KVersionLen, KSignatureLen, KIniFileSectionLen);
89 const TUint KCr = '\r';
90 const TUint KTab = '\t';
91 const TUint KSpace = ' ';
93 #ifdef CENTREP_CONV_TOOL
94 _LIT(KTransactFileName, "transact");
96 _LIT(KHexIntFormat, "0x%X");
97 _LIT(KUidFormat, "0x%08X");
98 _LIT(KRangeMetaFmt, "0x%X 0x%X 0x%08X");
99 _LIT(KMaskMetaFmt, "0x%X mask = 0x%X 0x%08X");
101 _LIT(KRangePrefix, "0x%X 0x%X");
102 _LIT(KMaskPrefix, "0x%08X mask = 0x%08X");
105 /////////////////////////////////////////////////////////////////////////////////////////////////
109 The function checks if the file with aFile name exists.
110 @param aFile File name, including the full path.
111 @return 0, if the file does not exist, non-zero value otherwise.
115 #ifdef CENTREP_CONV_TOOL
116 static TBool FileExists(const TDesC& aFile)
119 return TServerResources::iFs.Entry(aFile, entry) == KErrNone;
127 static TInt ReadFileL(RFile aFile, HBufC16*& aBuf)
130 TInt r = aFile.Size(size);
137 aBuf = HBufC16::NewL(len);
138 TPtr16 ptr16 = aBuf->Des();
139 TPtr8 ptr8((TUint8*)ptr16.Ptr(), 0, 2);
140 r = aFile.Read(ptr8, 2);
144 if(*ptr16.Ptr()!=KUcs2Bom)
146 __CENTREP_TRACE("File not Ucs2. No BOM");
149 ptr8.Set((TUint8*)ptr16.Ptr(), 0, size-2);
150 r = aFile.Read(ptr8);
153 ptr16.SetLength(len);
158 static TBool IsNegativeNumber(TLex& aLex)
160 if (aLex.Peek()=='-')
169 static TInt ReadNumberL(TLex& aLex, TUint32& aVal)
171 TRadix radix = EDecimal;
175 if(aLex.Peek().GetLowerCase()=='x')
184 if(aLex.Val(aVal, radix)!=KErrNone)
190 #ifdef CENTREP_CONV_TOOL
194 static void WriteBinary(TDes& aBuf, const HBufC8* aString)
198 TInt len = aString->Length();
200 aBuf.Append(KNullDataIndicator);
203 TPtr8 ptr8 = const_cast<HBufC8*>(aString)->Des();
204 for(TInt i=0;i<len;i++)
205 aBuf.AppendNumFixedWidth(ptr8[i], EHex, 2);
210 aBuf.Append(KNullDataIndicator);
215 The function writes setting value into the supplied buffer (aBuf).
216 @param aBuf The buffer where the setting value will be appended.
217 @param aSetting Reference to the setting object
218 @leave KErrGeneral If the supplied setting object has unknown type.
221 static void AddSettingValueL(TDes& aBuf, const TServerSetting& aSetting)
223 switch(aSetting.Type())
225 case TServerSetting::EInt:
226 aBuf.Append(KTypeInt);
228 aBuf.AppendNum(aSetting.GetIntValue());
230 case TServerSetting::EReal:
231 aBuf.Append(KTypeReal);
233 aBuf.AppendNum(aSetting.GetRealValue(), TRealFormat());
235 case TServerSetting::EString:
236 aBuf.Append(KTypeBinary);
238 WriteBinary(aBuf, aSetting.GetStrValue());
241 User::Leave(KErrGeneral); //unknown setting type
247 /////////////////////////////////////////////////////////////////////////////////////////////////
250 TInt CIniFileIn::NewLC(RFs& aFs,CIniFileIn*& aIniFile,const TDesC& aFullFileName)
252 aIniFile = new(ELeave) CIniFileIn(aFs);
253 CleanupStack::PushL(aIniFile);
255 CleanupClosePushL(file);
256 TInt r = file.Open(aFs, aFullFileName, EFileRead|EFileStreamText);
261 aIniFile->iFullName = HBufC::NewL(aFullFileName.Length());
262 TPtr filename = aIniFile->iFullName->Des();
263 filename.Copy(aFullFileName);
265 TInt rReadFile = ReadFileL(file,aIniFile->iBuf);
266 CleanupStack::PopAndDestroy(); //file
267 TInt rReadHeader=KErrNone;
268 if(rReadFile==KErrNone)
270 aIniFile->iLex.Assign(aIniFile->iBuf->Des());
271 rReadHeader=aIniFile->ReadHeaderL();
274 if((rReadFile==KErrCorrupt) || ( rReadHeader==KErrCorrupt))
281 CleanupStack::Pop();//file
288 CIniFileIn::~CIniFileIn()
297 TInt CIniFileIn::ReadHeaderL()
302 // Check file signature
308 iLex.SkipCharacters();
310 if(iLex.TokenLength()>KSignatureLen)
312 __CENTREP_TRACE1("[%S] Invalid header signature",iFullName);
315 buf.CopyLC(iLex.MarkedToken());
316 if(buf.Compare(KSignature)!=0)
318 __CENTREP_TRACE1("[%S] Invalid header signature",iFullName);
322 // Check file version
328 iLex.SkipCharacters();
330 if(iLex.TokenLength()>KVersionLen)
332 __CENTREP_TRACE1("[%S] Missing version keyword",iFullName);
335 buf.CopyLC(iLex.MarkedToken());
336 if(buf.Compare(KVersion)!=0)
338 __CENTREP_TRACE1("[%S] Missing version keyword",iFullName);
345 if(version>KCurrentVersion)
347 __CENTREP_TRACE1("[%S] Invalid version number",iFullName);
348 return(KErrNotSupported);
353 void CIniFileIn::SkipComments()
362 while(iLex.Get()!='\n' && !iLex.Eos()) {}
366 void CIniFileIn::SkipEqualSign()
375 TInt CIniFileIn::ReadSettingOnlyL(TServerSetting& aSetting,TBool& aSingleMetaFound)
379 aSingleMetaFound=EFalse;
388 TInt r=ReadNumberL(iLex, key);
391 // returns either KErrCorrupt or KErrNone
392 __CENTREP_TRACE1("[%S] Invalid single setting id",iFullName);
395 aSetting.SetKey(key);
397 iLex.SkipSpaceAndMark();
398 iLex.SkipCharacters();
400 if(iLex.TokenLength()>KMaxTypeLen)
402 __CENTREP_TRACE1("[%S] Invalid key type, must be one of: [int,real,string,string8,binary]",iFullName);
405 TBuf<KMaxTypeLen> type;
406 type.CopyLC(iLex.MarkedToken());
410 if(type.Compare(KTypeInt)==0)
412 if (IsNegativeNumber(iLex))
415 if(iLex.Val(i)!=KErrNone)
417 __CENTREP_TRACE1("[%S] Invalid negative integer value",iFullName);
420 aSetting.SetIntValue(i);
425 TInt r=ReadNumberL(iLex, i);
428 __CENTREP_TRACE1("[%S] Invalid integer value",iFullName);
431 aSetting.SetIntValue(i);
434 else if(type.Compare(KTypeReal)==0)
438 //iLex.Val with TReal can return KErrNoMemory
441 if (ret==KErrNoMemory)
442 User::LeaveNoMemory();
445 __CENTREP_TRACE1("[%S] Invalid real value",iFullName);
449 TReal* temp = new(ELeave)TReal(r);
450 aSetting.SetRealValue(temp);
453 else if(type.Compare(KTypeString)==0)
456 ret = ReadStringL(s);
459 __CENTREP_TRACE1("[%S] Invalid string value",iFullName);
462 aSetting.SetStrValue(s);
465 else if(type.Compare(KTypeString8)==0)
468 ret = ReadString16To8L(s);
471 __CENTREP_TRACE1("[%S] Invalid string8 value",iFullName);
474 aSetting.SetStrValue(s);
477 else if(type.Compare(KTypeBinary)==0)
480 ret = ReadBinaryL(s);
483 __CENTREP_TRACE1("[%S] Invalid binary value",iFullName);
486 aSetting.SetStrValue(s);
490 __CENTREP_TRACE1("[%S] Invalid key type, must be one of: [int,real,string,string8,binary]",iFullName);
493 //skip any spaces or tabs
494 while(iLex.Peek()==KSpace || iLex.Peek()==KTab)
502 carriage return reached which means that there is no meta AND capabilities
503 defined for this key. Thus setting meta to NULL to be able to set a value
504 from default section later.
506 if (iLex.Peek()==KCr)
512 r=ReadNumberL(iLex, meta);
514 If meta can not be read, it is not neccessary an error.
515 It might be not present for an individual key and it will be taken
516 from a default section.
517 If single meta is present, we need to remember so we can recognise a single
518 meta of 0 as distinct from no meta ( also sets meta to 0 ).
523 aSingleMetaFound=ETrue;
526 aSetting.SetMeta(meta);
532 Read an entire DefaultMeta section from ini file
533 and create FDefault metadata entries
536 @return KErrNone, KErrCorrupt or KErrNotFound
538 TInt CIniFileIn::ReadDefaultMetaSecSectionL(TUint32& aDefaultMeta, RDefaultMetaArray& aDefaultMetaRanges)
543 // Check if a DefaultMeta section is present
548 // we will need this section later to write the out file...
549 iLex.Mark(iMainSectionMark);
552 iLex.SkipCharacters();
554 if( iLex.TokenLength()!=KDefaultMetaSectionLen ||
555 (buf.CopyLC( iLex.MarkedToken() ), buf.Compare( KDefaultMetaSection )!=0) )
557 // Meta not available
563 // Lets read Meta settings
568 // we might have a default Meta section first
569 if(KErrNone != ReadNumber(aDefaultMeta))
571 // should we log that no default read policy?
575 // now lets try range policies
576 TInt r=ReadRangeMetaDefaultsL(aDefaultMetaRanges);
579 __CENTREP_TRACE1("[%S] Error parsing [defaultMeta]",iFullName);
582 iLex.Mark(iMainSectionMark);
588 Reads Meta defaults as defined for range of indexes
591 @return KErrNone, KErrCorrupt
593 TInt CIniFileIn::ReadRangeMetaDefaultsL(RDefaultMetaArray& aDefaultMetaRanges)
599 while(KErrNone == ReadNumber(lowKey))
601 // highKey and mask needs to be zero'd every cycle...
604 TUint32 defaultMeta = 0 ;
607 // may be not range but key & mask so lets check 'mask' keyword
608 if(!iLex.Peek().IsDigit())
610 //so should be mask then...
612 while((iLex.Peek()!='=')&&(!iLex.Eos()))
616 if(iLex.TokenLength() >= KMaskLen)
619 // not necessarily bad thing... could be space there first
625 // check if KMaskLen is < buf length?
626 buf.CopyLC(iLex.MarkedToken());
627 if(buf.Compare(KMaskString)!=0)
629 __CENTREP_TRACE1("[%S] Missing 'mask' keyword [defaultMeta]",iFullName);
634 if('=' != iLex.Get())
636 __CENTREP_TRACE1("[%S] Missing '=' for 'mask' keyword [defaultMeta]",iFullName);
640 TInt r=ReadNumberL(iLex,mask);
643 __CENTREP_TRACE1("[%S] Invalid 'mask' for keyspace range [defaultMeta]",iFullName);
649 TInt r = ReadNumberL(iLex,highKey);
652 __CENTREP_TRACE1("[%S] Invalid end of range [defaultMeta]",iFullName);
658 if(KErrNone == ReadNumber(defaultMeta))
660 TSettingsDefaultMeta metaDefault(defaultMeta,lowKey, highKey, mask);
661 aDefaultMetaRanges.AppendL(metaDefault);
665 // unfortunately, we can't tell if we got here because the default
666 // meta was bad or because there was an invalid start value for the range.
667 __CENTREP_TRACE1("[%S] Range defined without default or bad start of range [defaultMeta]",iFullName);
668 // range specified with no default Meta!
677 Read Owner section from ini file and extract owner UID
680 @return KErrNone, KErrCorrupt or KErrNotFound
682 TInt CIniFileIn::ReadOwnerSectionL(TUint32 &aOwnerUID)
690 // we will need this section later to write the out file...
691 iLex.Mark(iMainSectionMark);
694 iLex.SkipCharacters();
696 if( iLex.TokenLength()!=KOwnerSectionLen ||
697 (buf.CopyLC( iLex.MarkedToken() ), buf.Compare( KOwnerSection )!=0) )
699 // Owner section not available
705 // Found an "owner" section - must be followed by a UID (hex number
706 // in format 0xnnnnn) to be valid!
711 if(iLex.Peek().GetLowerCase()=='x')
714 if(iLex.Val(aOwnerUID, EHex)!=KErrNone)
716 __CENTREP_TRACE1("[%S] Invalid owner UID not valid hex digit [owner]",iFullName);
722 __CENTREP_TRACE1("[%S] Invalid owner UID not valid hex digit [owner]",iFullName);
728 __CENTREP_TRACE1("[%S] Invalid owner UID not valid hex digit [owner]",iFullName);
733 iLex.Mark(iMainSectionMark);
739 Read Timestamp section from ini file and extract value as a TTime
742 @return KErrNone, KErrCorrupt or KErrNotFound
744 TInt CIniFileIn::ReadTimeStampSectionL(TTime &aTimeStamp)
749 // we will need this section later to write the out file...
750 iLex.Mark(iMainSectionMark);
753 iLex.SkipCharacters();
755 buf.CopyLC( iLex.MarkedToken());
757 if( iLex.TokenLength()!=KTimeStampSectionLen ||
758 (buf.Compare( KTimeStampSection )!=0) )
760 // Timestamp section not available
766 // Found a "timestamp" section - must be followed by a a timestamp
767 // either in format...
769 // YYYYMMDD:HHMMSS.MMMMMM where:
770 // YYYY = 4 digit year
771 // MM = 2 digit numeric month
772 // DD = 2 digit numeric date
774 // MM = 2 digit minute
775 // SS = 2 digit second
776 // MMMMMM = 6 digit microseconds
777 // Note that this is the format used for constructing/initialising
778 // a TTime from a string.
780 // ...or a 64-bit integer which can be converted to
781 // to a TTime to be considered valid!
785 iLex.SkipCharacters() ;
787 buf.CopyLC(iLex.MarkedToken()) ;
788 if (aTimeStamp.Set(buf) !=KErrNone)
790 TInt64 intTimeStamp ;
792 if (iLex.Val(intTimeStamp) != KErrNone)
794 __CENTREP_TRACE1("[%S] Invalid time stamp [timestamp]",iFullName);
799 aTimeStamp = intTimeStamp;
803 iLex.Mark(iMainSectionMark);
808 Read a setting and it's single policy ( if it exists )
811 @return KErrNone, KErrCorrupt
812 aSetting setting read from ini file
813 aSingleReadPolicy single read policy if any
814 aSingleWritePolicy single write policy if any
815 aSingleReadPolicyFound ETrue if single read policy found with this key, EFalse if not
816 aSingleWritePolicyFound ETrue if single write policy found with this key, EFalse if not
817 aSingleMetaFound ETrue if single metadata found with this key, EFalse if not
819 TInt CIniFileIn::ReadSettingL(TServerSetting& aSetting,TSecurityPolicy& aSingleReadPolicy,TSecurityPolicy& aSingleWritePolicy, TBool& aSingleReadPolicyFound, TBool& aSingleWritePolicyFound, TBool& aSingleMetaFound)
821 aSingleReadPolicyFound = EFalse;
822 aSingleWritePolicyFound = EFalse;
824 TInt error = ReadSettingOnlyL(aSetting, aSingleMetaFound);
825 if(KErrNone == error)
827 //Need to push into cleanupstack for string setting
829 // when multiple policies enabled then read in a loop
831 if (iLex.Peek() !=KCr)
833 // if neither read/write policy found we do not create TSettingsAccessPolicy at all...
834 TInt err=ReadRdPolicyL(aSingleReadPolicy);
836 aSingleReadPolicyFound=ETrue;
839 //we need to return error code rather than assuming no single policy is found
840 if (err==KErrCorrupt || err==KErrNoMemory)
843 if (err == KErrCorrupt)
845 __CENTREP_TRACE1("[%S] Invalid read setting",iFullName);
848 aSetting.PopAndDestroy();
851 //else if ret!=KErrNone very likely it is KErrNotFound so leave
852 //the state of the writePolicyFound to EFalse
855 err=ReadWrPolicyL(aSingleWritePolicy);
857 aSingleWritePolicyFound=ETrue;
860 //we need to return error code rather than assuming no single policy is found
861 if (err==KErrCorrupt || err==KErrNoMemory)
864 if (err == KErrCorrupt)
866 __CENTREP_TRACE1("[%S] Invalid write setting",iFullName);
869 aSetting.PopAndDestroy();
872 //else if ret!=KErrNone very likely it is KErrNotFound so leave
873 //the state of the writePolicyFound to EFalse
877 //Need to pop back the setting
883 TInt CIniFileIn::SkipPlatSecSectionL()
885 HBufC* platSecSection;
886 TInt r=GetPlatSecSectionLC(platSecSection);
888 CleanupStack::PopAndDestroy(platSecSection);
892 TInt CIniFileIn::SkipOwnerSectionL()
895 TInt r=GetOwnerSectionLC(ownerSection);
897 CleanupStack::PopAndDestroy(ownerSection);
901 TInt CIniFileIn::SkipDefaultMetaSectionL()
904 TInt r=GetDefaultMetaSectionLC(section);
906 CleanupStack::PopAndDestroy(section);
910 TInt CIniFileIn::SkipTimeStampSectionL()
912 HBufC* timeStampSection;
913 TInt r=GetTimeStampSectionLC(timeStampSection);
915 CleanupStack::PopAndDestroy(timeStampSection);
920 Read an entire PlatSec section from ini file
921 and create TSecurityPolicy for default access and for range of indexes
924 @return KErrNone, KErrCorrupt or KErrNotFound
926 TInt CIniFileIn::ReadPlatSecSectionL(TSecurityPolicy& aDefaultReadPolicy, TBool& aGotDefaultReadPolicy,
927 TSecurityPolicy& aDefaultWritePolicy, TBool& aGotDefaultWritePolicy,
928 RRangePolicyArray& aRangePolicies)
933 aGotDefaultReadPolicy = EFalse ;
934 aGotDefaultWritePolicy = EFalse ;
937 // Check if the PlatSec section is present
941 // we will need this section later to write the out file...
942 iLex.Mark(iMainSectionMark);
945 iLex.SkipCharacters();
947 if( iLex.TokenLength()!=KPlatSecSectionLen ||
948 (buf.CopyLC( iLex.MarkedToken() ), buf.Compare( KPlatSecSection )!=0) )
950 // PlatSec section not available
956 // Lets read the policies
961 // we might have a default policies first
962 // check for default read policy
963 r=ReadRdPolicyL(aDefaultReadPolicy);
965 aGotDefaultReadPolicy=ETrue;
968 //we need to return error code rather than assuming no default policy is found
969 if (r==KErrCorrupt || r==KErrNoMemory)
972 if (r == KErrCorrupt)
974 __CENTREP_TRACE1("[%S] Invalid read policy [platsec]",iFullName);
979 //else if ret!=KErrNone very likely it is KErrNotFound so leave
980 //the state of the writePolicyFound to EFalse
982 // check for default write policy
983 r=ReadWrPolicyL(aDefaultWritePolicy);
985 aGotDefaultWritePolicy=ETrue;
988 //we need to return error code rather than assuming no default policy is found
989 if (r==KErrCorrupt || r==KErrNoMemory)
992 if (r == KErrCorrupt)
994 __CENTREP_TRACE1("[%S] Invalid write policy [platsec]",iFullName);
999 //else if ret!=KErrNone very likely it is KErrNotFound so leave
1000 //the state of the writePolicyFound to EFalse
1002 // now lets try range policies
1003 r = ReadRangePoliciesL(aDefaultReadPolicy,aDefaultWritePolicy,aRangePolicies);
1006 __CENTREP_TRACE1("[%S] Invalid range policy [platsec]",iFullName);
1009 // it must be the main section now so lets check
1012 iLex.SkipCharacters();
1014 if(iLex.TokenLength()>KBufLen)
1017 buf.CopyLC(iLex.MarkedToken());
1018 if(buf.Compare(KMainSection)!=0)
1023 iLex.Mark(iMainSectionMark);
1029 Reads TSecurityPolicy as defined for range of indexes
1032 @return KErrNone, KErrCorrupt
1035 TInt CIniFileIn::ReadRangePoliciesL(const TSecurityPolicy& aDefaultReadPolicy,
1036 const TSecurityPolicy& aDefaultWritePolicy,
1037 RRangePolicyArray& aRangePolicies)
1043 while(KErrNone == ReadNumber(lowKey))
1045 // highKey and mask needs to be zero'd every cycle...
1046 TUint32 highKey = 0;
1049 // may be not range but key & mask so lets check 'mask' keyword
1050 if(!iLex.Peek().IsDigit())
1052 //so should be mask then...
1054 while((iLex.Peek()!='=')&&(!iLex.Eos()))
1058 if(iLex.TokenLength() >= KMaskLen)
1061 // not necessarily bad thing... could be space there first
1067 // check if KMaskLen is < buf length?
1068 buf.CopyLC(iLex.MarkedToken());
1069 if(buf.Compare(KMaskString)!=0)
1071 __CENTREP_TRACE1("[%S] Missing 'mask' keyword for range [platsec]",iFullName);
1076 if('=' != iLex.Get())
1078 __CENTREP_TRACE1("[%S] Missing '=' for 'mask' keyword for range [platsec]",iFullName);
1082 TInt r = ReadNumberL(iLex,mask);
1085 __CENTREP_TRACE1("[%S] Invalid value for 'mask' keyword [platsec]",iFullName);
1091 TInt r = ReadNumberL(iLex,highKey);
1094 __CENTREP_TRACE1("[%S] Invalid end of range [platsec]",iFullName);
1098 TBool writePolicyFound = EFalse;
1099 TBool readPolicyFound= EFalse;
1100 TSecurityPolicy readPolicy;
1101 TSecurityPolicy writePolicy;
1104 ret=ReadRdPolicyL(readPolicy);
1106 readPolicyFound=ETrue;
1109 if (ret==KErrCorrupt || ret==KErrNoMemory)
1111 #ifdef CENTREP_TRACE
1112 if (ret == KErrCorrupt)
1114 __CENTREP_TRACE1("[%S] Invalid read policy for range [platsec]",iFullName);
1119 //else if ret!=KErrNone very likely it is KErrNotFound so leave
1120 //the state of the writePolicyFound to EFalse
1122 ret=ReadWrPolicyL(writePolicy);
1124 writePolicyFound=ETrue;
1127 if (ret==KErrCorrupt || ret==KErrNoMemory)
1129 #ifdef CENTREP_TRACE
1130 if (ret == KErrCorrupt)
1132 __CENTREP_TRACE1("[%S] Invalid write policy for range [platsec]",iFullName);
1137 //else if ret!=KErrNone very likely it is KErrNotFound so leave
1138 //the state of the writePolicyFound to EFalse
1140 //If only one of the policy is specified,need to set the other one to default value
1141 //to prevent it from being uninitialized
1142 if(readPolicyFound || writePolicyFound)
1144 if (!readPolicyFound)
1145 readPolicy=aDefaultReadPolicy;
1146 if (!writePolicyFound)
1147 writePolicy=aDefaultWritePolicy;
1148 TSettingsAccessPolicy settingsPolicy(readPolicy,writePolicy,
1149 lowKey, highKey, mask);
1150 aRangePolicies.AppendL(settingsPolicy);
1154 // range specified with no policies!
1155 __CENTREP_TRACE1("[%S] Range specified with no policies [platsec]",iFullName);
1165 @return TCapability as converted from string description
1168 TInt CIniFileIn::ReadCapabilityL(TCapability& aCapability)
1173 User::Leave(KErrNotFound);
1175 // check if '=' still there and skip
1180 // potentially comma separated list of capabilities
1181 // we read just one at the time
1182 while(!iLex.Peek().IsSpace() && (iLex.Peek() != ',') && !iLex.Eos())
1185 if(iLex.TokenLength()>KMaxCapabilityStringLen)
1187 __CENTREP_TRACE1("[%S] Invalid capability [platsec]",iFullName);
1192 TBuf<KMaxCapabilityStringLen> string;
1193 string.CopyLC(iLex.MarkedToken());
1195 // lets check against list of capabilities
1198 // descriptors...desriptors - we need it for conversion from const char[] to TPtr
1199 HBufC *cap = HBufC::NewLC(KMaxCapabilityStringLen);
1200 TPtr capPtr = cap->Des() ;
1201 HBufC8 *capNarrow = HBufC8::NewLC(KMaxCapabilityStringLen) ;
1202 for(capability=0; capability<ECapability_Limit; capability++)
1204 // CapabilityNames is const char[]
1205 *capNarrow = (const TUint8 *)CapabilityNames[capability];
1207 capPtr.Copy(*capNarrow);
1209 if(0 == string.Compare(capPtr))
1211 aCapability=static_cast<TCapability>(capability);
1212 CleanupStack::PopAndDestroy(capNarrow);
1213 CleanupStack::PopAndDestroy(cap);
1217 CleanupStack::PopAndDestroy(capNarrow);
1218 CleanupStack::PopAndDestroy(cap);
1220 // to satisfy compiler
1221 aCapability=ECapability_Limit;
1223 __CENTREP_TRACE1("[%S] Invalid capability [platsec]",iFullName);
1224 // we didn't find anything
1231 @param aAlwaysPass will be true if the first capability is AlwaysPass
1232 aAlwaysFail will be true if the first capability is AlwaysFail
1234 void CIniFileIn::CheckForAlwaysPassOrFailL(TBool& aAlwaysPass,TBool& aAlwaysFail)
1239 User::Leave(KErrNotFound);
1241 // check if '=' still there and skip
1245 // we are just checking if AlwaysPass has been set
1246 while(!iLex.Peek().IsSpace() && !iLex.Eos())
1249 if(iLex.TokenLength()>KMaxCapabilityStringLen)
1257 TBuf<KMaxCapabilityStringLen> string;
1258 string.CopyLC(iLex.MarkedToken());
1260 aAlwaysPass=(string.Compare(KAccessAlwaysPass)==0);
1261 aAlwaysFail=(string.Compare(KAccessAlwaysFail)==0);
1262 //if not either AlwaysPass or AlwaysFail reset the Lex position to Mark
1263 if(!(aAlwaysPass || aAlwaysFail))
1267 TInt CIniFileIn::ReadCapabilitiesL(TSecurityPolicy& aPolicy)
1269 // we can have 0-7 capabilities
1270 const TInt maxCapWithoutSid = 7;
1271 TCapability capabilities[maxCapWithoutSid];
1274 for(index=0;index<maxCapWithoutSid;index++)
1275 capabilities[index] = ECapability_None;
1279 // lets read the first capability... there must be at least one!
1280 TBool isAlwaysPass=EFalse;
1281 TBool isAlwaysFail=EFalse;
1282 CheckForAlwaysPassOrFailL(isAlwaysPass,isAlwaysFail);
1283 if(isAlwaysPass || isAlwaysFail)
1285 //default is set to EAlwaysFail
1286 TSecurityPolicy policy;
1288 policy=TSecurityPolicy(TSecurityPolicy::EAlwaysPass);
1289 aPolicy.Set(policy.Package());
1293 TInt r=ReadCapabilityL(capabilities[index]);
1300 while((iLex.Peek() == ','))
1302 //if capabilities supplied is more than allowed return KErrCorrupt
1303 if (index>=maxCapWithoutSid)
1305 __CENTREP_TRACE1("[%S] Too many read capabilities [platsec]",iFullName);
1309 iLex.SkipAndMark(1);
1310 r=ReadCapabilityL(capabilities[index]);
1313 // do we have yet more?
1317 TSecurityPolicy policy(static_cast<TCapability>(capabilities[0]),
1318 static_cast<TCapability>(capabilities[1]),
1319 static_cast<TCapability>(capabilities[2]),
1320 static_cast<TCapability>(capabilities[3]),
1321 static_cast<TCapability>(capabilities[4]),
1322 static_cast<TCapability>(capabilities[5]),
1323 static_cast<TCapability>(capabilities[6]));
1324 aPolicy.Set(policy.Package());
1329 TInt CIniFileIn::ReadSidAndCapabilitiesL(TSecurityPolicy& aPolicy,const TDesC& aPolicyType,
1332 //SID was specified we can have 0-3 capabilities
1333 const TInt maxCapWithSid = 3;
1335 TCapability capabilities[maxCapWithSid];
1337 for(index=0;index<maxCapWithSid;index++)
1338 capabilities[index] = ECapability_None;
1340 // lets see what we have here...
1341 iLex.SkipSpaceAndMark();
1343 // we are looking for a string terminated by '='
1344 // up to a certain length....
1345 while((iLex.Peek()!='=')&&(!iLex.Eos()))
1349 if(iLex.TokenLength() >= KMaxAccessTypeLen)
1352 // not necessarily bad thing... could be space there first
1358 TBuf<KMaxAccessTypeLen> string;
1359 string.CopyLC(iLex.MarkedToken());
1362 // lets check if there are any capabilities specified and if of correct type
1363 if(0 == string.Compare(aPolicyType))
1365 //Need to check for AlwaysPass or AlwaysFail
1366 TBool isAlwaysPass=EFalse;
1367 TBool isAlwaysFail=EFalse;
1368 CheckForAlwaysPassOrFailL(isAlwaysPass,isAlwaysFail);
1369 if(isAlwaysPass || isAlwaysFail)
1371 //default is set to EAlwaysFail
1372 TSecurityPolicy policy;
1374 policy=TSecurityPolicy(TSecurityPolicy::EAlwaysPass);
1375 aPolicy.Set(policy.Package());
1379 // so we have some capabilities to read
1380 TInt r = ReadCapabilityL(capabilities[index]);
1386 while((iLex.Peek() == ','))
1388 //cannot permit more than 3 capabilities when followed by a SID
1389 if (index>=maxCapWithSid)
1391 __CENTREP_TRACE1("[%S] Too many read capabilities [platsec]",iFullName);
1395 iLex.SkipAndMark(1);
1396 TInt r= ReadCapabilityL(capabilities[index]);
1399 // do we have yet more?
1403 TSecurityPolicy policy(aSid,static_cast<TCapability>(capabilities[0]),
1404 static_cast<TCapability>(capabilities[1]),
1405 static_cast<TCapability>(capabilities[2]));
1406 aPolicy.Set(policy.Package());
1411 // so no capabilities just SID
1412 // and the token wasn't for us either
1414 TSecurityPolicy policy(aSid);
1415 aPolicy.Set(policy.Package());
1421 TInt CIniFileIn::ReadPolicyL(TSecurityPolicy& aPolicy,TInt aPolicyType)
1424 // lets check if there a SID is specified
1425 iLex.SkipSpaceAndMark();
1428 return KErrNotFound;
1430 while((iLex.Peek()!='=')&&(!iLex.Eos()))
1434 if(iLex.TokenLength() >= KMaxAccessTypeLen)
1437 // not necessarily bad thing... could be space there first
1443 // we are looking for either KReadAccessSid, KReadAccessCap, KWriteAccessSid,KWriteAccessCap
1444 TBuf<KMaxAccessTypeLen> accessString;
1445 accessString.CopyLC(iLex.MarkedToken());
1447 TInt returnCode = KErrNotFound;
1448 // we expect a combination of sid_rd1 cap_rd1 sid_wr1 cap_wr1
1449 if(accessString.Compare(KReadAccessSidString)==0)
1451 // we've got read - either SID or SID+CAP! Are we expecting read?
1452 if(KReadPolicy == aPolicyType)
1456 if (ReadNumber(sid) != KErrNone)
1458 __CENTREP_TRACE1("[%S] Invalid SID (read)[platsec]",iFullName);
1461 TSecureId sidId(sid);
1462 // so we read sid and now we expect cap_rd1=cap1,cap2,..
1463 // lets assume it's a SID+CAP for now
1464 returnCode= ReadSidAndCapabilitiesL(aPolicy,KReadAccessCapString,sidId);
1467 else if(accessString.Compare(KReadAccessCapString)==0)
1469 // we've got read CAP only! Are we expecting read?
1470 if(KReadPolicy == aPolicyType)
1472 returnCode=ReadCapabilitiesL(aPolicy);
1475 else if(accessString.Compare(KWriteAccessSidString)==0)
1477 // we've got write - either SID or SID+CAP! Are we expecting read?
1478 if(KWritePolicy == aPolicyType)
1482 if(ReadNumber(sid)!=KErrNone)
1484 __CENTREP_TRACE1("[%S] Invalid SID (write)[platsec]",iFullName);
1487 TSecureId sidId(sid);
1488 // lets assume SID+CAP for now
1489 returnCode= ReadSidAndCapabilitiesL(aPolicy,KWriteAccessCapString,sidId);
1492 else if(accessString.Compare(KWriteAccessCapString)==0)
1494 // we've got write CAP only! Are we expecting write?
1495 if(KWritePolicy == aPolicyType)
1497 returnCode=ReadCapabilitiesL(aPolicy);
1500 if(KErrNone != returnCode)
1506 TInt CIniFileIn::ReadRdPolicyL(TSecurityPolicy& aReadPolicy)
1508 return ReadPolicyL(aReadPolicy,KReadPolicy);
1511 TInt CIniFileIn::ReadWrPolicyL(TSecurityPolicy& aReadPolicy)
1513 return ReadPolicyL(aReadPolicy,KWritePolicy);
1516 TInt CIniFileIn::ReadStringL(HBufC8*& aString)
1520 TChar c = iLex.Peek();
1522 if(c=='\'' || c=='\"')
1524 iLex.SkipAndMark(1);
1528 TBool complete = EFalse;
1531 for(len=0;!iLex.Eos();len++)
1535 if(quote ? c==quote : c.IsSpace())
1545 if(!complete || len>KMaxUnicodeStringLength)
1548 aString = HBufC8::NewL(len*2);
1549 TPtr8 ptr8 = aString->Des();
1550 ptr8.SetLength(len*2);
1551 TPtr16 ptr16((TUint16*)ptr8.Ptr(), len, len);
1556 _LIT(KSpecialChars, "abfnrvt0");
1557 static TUint8 specialChars[] = { '\a', '\b', '\f', '\n', '\r', '\v', '\t', '\0' };
1558 for(TInt i=0;i<len;i++)
1565 TInt i = KSpecialChars().Locate(c);
1567 c = specialChars[i];
1570 ptr16[i] = (TUint16)c;
1575 iLex.Inc(); // trailing quote
1582 TInt CIniFileIn::ReadString16To8L(HBufC8*& aString)
1586 TChar c = iLex.Peek();
1588 if(c=='\'' || c=='\"')
1590 iLex.SkipAndMark(1);
1594 TBool complete = EFalse;
1597 for(len=0;!iLex.Eos();len++)
1601 if(quote ? c==quote : c.IsSpace())
1611 if(!complete || len>KMaxUnicodeStringLength)
1614 aString = HBufC8::NewLC(len*2);
1616 HBufC16* tempBuffer = HBufC16::NewLC(len);
1618 TPtr16 ptr16 = tempBuffer->Des();
1619 TPtr8 ptr8 = aString->Des();
1620 ptr8.SetLength(len*2);
1626 _LIT(KSpecialChars, "abfnrvt0");
1627 static TUint8 specialChars[] = { '\a', '\b', '\f', '\n', '\r', '\v', '\t', '\0' };
1628 for(TInt i=0;i<len;i++)
1635 TInt i = KSpecialChars().Locate(c);
1637 c = specialChars[i];
1644 const TInt returnValue = CnvUtfConverter::ConvertFromUnicodeToUtf8(ptr8, ptr16);
1645 if (returnValue==CnvUtfConverter::EErrorIllFormedInput)
1647 CleanupStack::PopAndDestroy(tempBuffer);
1648 CleanupStack::PopAndDestroy(aString);
1651 else if(returnValue<0)
1652 User::Leave(KErrGeneral);
1654 CleanupStack::PopAndDestroy(tempBuffer);
1655 CleanupStack::Pop(aString);
1658 iLex.Inc(); // trailing quote
1663 TInt CIniFileIn::ReadBinaryL(HBufC8*& aString)
1666 iLex.SkipCharacters();
1667 TInt len = iLex.TokenLength();
1670 if(len==1 && iLex.Peek()==KNullDataIndicator)
1673 aString = HBufC8::NewL(0);
1674 TPtr8 ptr8 = aString->Des();
1679 if(len>KMaxBinaryLength*2 || len%2)
1686 aString = HBufC8::NewL(len);
1687 TPtr8 ptr8 = aString->Des();
1688 ptr8.SetLength(len);
1691 for(TInt i=0;i<len;i++)
1693 buf[0] = (TUint8)iLex.Get();
1694 buf[1] = (TUint8)iLex.Get();
1696 if(lex.Val(ptr8[i], EHex)!=KErrNone)
1705 TInt CIniFileIn::ReadNumber(TUint32& aVal)
1710 return KErrNotFound;
1712 TRadix radix = EDecimal;
1713 if(iLex.Peek()=='0')
1716 if(iLex.Peek().GetLowerCase()=='x')
1725 return iLex.Val(aVal, radix);
1729 TInt CIniFileIn::GetOwnerSectionLC(HBufC*& aSection)
1731 return( GetSectionLC(KOwnerSection(), aSection));
1734 TInt CIniFileIn::GetDefaultMetaSectionLC(HBufC*& aSection)
1736 return( GetSectionLC(KDefaultMetaSection(), aSection));
1739 TInt CIniFileIn::GetTimeStampSectionLC(HBufC*& aSection)
1741 return( GetSectionLC(KTimeStampSection(), aSection));
1744 TInt CIniFileIn::GetPlatSecSectionLC(HBufC*& aSection)
1746 return( GetSectionLC(KPlatSecSection(), aSection));
1749 TInt CIniFileIn::GetSectionLC(const TDesC16& aSectionId, HBufC*& aSection)
1752 TLexMark sectionMark;
1757 iLex.Mark(sectionMark);
1760 iLex.SkipCharacters();
1762 if( (iLex.TokenLength() != aSectionId.Length()) &&
1763 (buf.CopyLC(iLex.MarkedToken()), buf.Compare( aSectionId )!=0) )
1765 // Expected section not found at this point in the file
1766 // Note that this is not an error
1772 // Read in the section by grabbing text until we reach
1773 // the start of another section.
1777 // Wait for any other section marker
1782 iLex.SkipCharacters();
1784 if(iLex.TokenLength() <= KBufLen)
1786 buf.CopyLC(iLex.MarkedToken());
1787 if((buf.Compare(KMainSection) == 0) ||
1788 (buf.Compare(KOwnerSection) == 0) ||
1789 (buf.Compare(KPlatSecSection) == 0) ||
1790 (buf.Compare(KTimeStampSection) == 0) ||
1791 (buf.Compare(KDefaultMetaSection) == 0))
1793 iLex.Mark(iMainSectionMark);
1794 iLex.UnGetToMark() ;
1795 TPtrC lex = iLex.MarkedToken(sectionMark);
1796 HBufC* section = HBufC::NewMaxLC(lex.Length()); //'\n'
1797 TPtr ptr = section->Des();
1807 TInt CIniFileIn::FindMainSectionL(void)
1812 // Check if a Main section is present
1817 // we will need this section later to write the out file...
1818 iLex.Mark(iMainSectionMark);
1821 iLex.SkipCharacters();
1823 if( iLex.TokenLength()!=KMainSectionLen ||
1824 (buf.CopyLC( iLex.MarkedToken() ), buf.Compare( KMainSection )!=0) )
1826 // Meta not available
1828 return KErrNotFound;
1831 iLex.Mark(iMainSectionMark);
1835 #ifdef CENTREP_TRACE
1836 HBufC* CIniFileIn::FullName()
1842 #ifdef CENTREP_CONV_TOOL
1843 //===================================================================
1844 // TCompiledSecurityPolicy class
1845 // Used for accessing private data members of TSecurityPolicy. It
1846 // uses the fact that TSecurityPolicy class has a friend whose name
1847 // is TCompiledSecurityPolicy.
1848 // See dbms/tdbms/securitypolicy.h for similar strategy.
1851 // The longest possible security string is one that has 7 capabilities.
1852 static const TInt KSecPolicyStrSize = KMaxCapabilityStringLen * 7 + 10;
1854 class TCompiledSecurityPolicy
1857 TCompiledSecurityPolicy(const TSecurityPolicy& aSecurityPolicy) :
1858 iSecurityPolicy(aSecurityPolicy) { }
1859 const TDesC& TextualizePolicyL(TCapAccessMode aMode);
1868 TCapability CapabilityAt(TInt aIndex) const;
1869 void DoCapabilitySection(TInt aMaxNumCaps);
1870 void AppendModeHeader(TCapAccessMode aAccessMode, THeaderType aType);
1873 const TSecurityPolicy& iSecurityPolicy;
1874 TBuf<KSecPolicyStrSize> iBuf;
1877 /////////////////////////////////////////////////////////////////////////////////////////////////
1878 // CIniFileOut class
1880 Standard, phase-one CIniFileOut instance creation method.
1881 The created CIniFileOut instance will use a temporary text file to store the repository settings.
1882 CIniFileOut::CommitL() should be called at the end to finalize the changes.
1883 @return A pointer to a fully constructed CIniFileOut instance.
1884 @leave System-wide error codes, including KErrNoMemory.
1886 CIniFileOut* CIniFileOut::NewLC(RFs& aFs,const TDesC& aOutFileName)
1888 CIniFileOut* inifile = new(ELeave) CIniFileOut(aFs);
1889 CleanupStack::PushL(inifile);
1890 inifile->ConstructL(aOutFileName);
1894 CIniFileOut::CIniFileOut(RFs& aFs)
1895 : iCommited(EFalse), iTransFileBuf(4 * 1024),iFs(aFs)// 4K buffer size
1900 Standard, phase-two CIniFileOut instance creation method.
1901 Creates the transaction file.
1902 Initializes transaction file buffer - iTransFileBuf instance.
1903 @leave System-wide error codes, including KErrNoMemory.
1905 void CIniFileOut::ConstructL(const TDesC& aOutFileName)
1907 iOutFileName=aOutFileName.AllocL();
1908 _LIT(KTmpExtension,"tmp");
1909 User::LeaveIfError(iTransFilePath.Set(aOutFileName, NULL, &(KTmpExtension())));
1910 User::LeaveIfError(iTransFile.Replace(iFs, iTransFilePath.FullName(), EFileWrite | EFileStreamText));
1911 iTransFileBuf.Attach(iTransFile, 0);
1915 Closes and deletes the transaction file.
1916 If CIniFileOut::CommitL() has not been called prior the destructor call, all the changes
1919 CIniFileOut::~CIniFileOut()
1923 iTransFileBuf.Close();
1924 // If a debug build - record error
1925 TInt fileDeleteErr=iFs.Delete(iTransFilePath.FullName());
1927 if (fileDeleteErr != KErrNone)
1929 RDebug::Print(_L("CIniFileOut::~CIniFileOut - Failed to delete file. Error = %d"), fileDeleteErr);
1932 (void)fileDeleteErr;
1936 delete iOutFileName;
1940 The method writes supplied setting value to the output file.
1941 @param aSetting Setting instance, which value has to be written to the output file.
1942 @param accessPolicies A string descriptor, referencing related to aSetting access policies.
1943 @leave System-wide error codes, including KErrNoMemory.
1945 void CIniFileOut::WriteSettingL(const TServerSetting& aSetting
1946 #ifdef SYMBIAN_CENTREP_SUPPORT_MULTIROFS
1947 ,TUint32 aCreVersion
1953 #ifdef SYMBIAN_CENTREP_SUPPORT_MULTIROFS
1960 void CIniFileOut::WriteSettingL(const TServerSetting& aSetting,
1961 const TSettingsAccessPolicy& aAccessPolicy
1962 #ifdef SYMBIAN_CENTREP_SUPPORT_MULTIROFS
1963 ,TUint32 aCreVersion
1969 #ifdef SYMBIAN_CENTREP_SUPPORT_MULTIROFS
1973 iBuf.Append(KSpace);
1974 #ifdef SYMBIAN_CENTREP_SUPPORT_MULTIROFS
1975 if (aCreVersion<2 || (aCreVersion>=2 && aAccessPolicy.iHighKey!=0))
1977 AppendSecurityPolicyL(aAccessPolicy.iReadAccessPolicy, ECapReadAccess);
1978 iBuf.Append(KSpace);
1979 #ifdef SYMBIAN_CENTREP_SUPPORT_MULTIROFS
1980 if (aCreVersion<2 || (aCreVersion>=2 && aAccessPolicy.iKeyMask!=0))
1982 AppendSecurityPolicyL(aAccessPolicy.iWriteAccessPolicy, ECapWriteAccess);
1986 void CIniFileOut::DoSettingL(const TServerSetting& aSetting
1987 #ifdef SYMBIAN_CENTREP_SUPPORT_MULTIROFS
1988 ,TUint32 aCreVersion
1992 iBuf.AppendNum(aSetting.Key(), EDecimal);
1993 iBuf.Append(KSpace);
1995 ::AddSettingValueL(iBuf, aSetting);
1997 iBuf.Append(KSpace);
1999 if (!aSetting.Meta())
2001 iBuf.AppendNum(0, EDecimal);
2005 #ifdef SYMBIAN_CENTREP_SUPPORT_MULTIROFS
2006 //need to check on the CRE Version too
2007 TBool isClean=const_cast<TServerSetting&>(aSetting).IsClean();
2008 if (aCreVersion<2 || (aCreVersion>=2 && (aSetting.IsIndividualMeta() || (!aSetting.IsIndividualMeta() && isClean ))))
2010 TUint32 metaToWrite=aSetting.Meta();
2012 if (aCreVersion>=2 && isClean && aSetting.IsIndividualMeta())
2014 metaToWrite|=KMetaIndividual;
2016 iBuf.AppendFormat(KHexIntFormat, metaToWrite);
2019 iBuf.AppendFormat(KHexIntFormat, aSetting.Meta());
2025 The method commits settings file changes.
2026 If the commit operation fails, the existing settings file will stay unchanged.
2027 @leave System-wide error codes.
2029 void CIniFileOut::CommitL()
2031 iTransFileBuf.SynchL();
2032 iTransFileBuf.Close();
2034 User::LeaveIfError(iFs.Replace(iTransFilePath.FullName(),*iOutFileName));
2039 void CIniFileOut::WriteMainSectionHeaderL()
2041 WriteLineL(KMainSection());
2045 Writes a text line to the repository file.
2046 @param aData The string which will be written to the file as a single text line
2047 @leave System-wide error codes
2049 void CIniFileOut::WriteLineL(const TDesC& aData)
2051 iTransFileBuf.WriteL(reinterpret_cast <const TUint8*> (aData.Ptr()), aData.Size());
2052 iTransFileBuf.WriteL(reinterpret_cast <const TUint8*> (KCrNl().Ptr()), KCrNl().Size());
2056 Writes repository file header.
2057 @leave System-wide error codes
2059 void CIniFileOut::WriteHeaderL()
2063 buf.Append(KUcs2Bom);
2064 buf.Append(KSignature);
2068 buf.Append(KVersion);
2070 buf.AppendNum(KCurrentVersion);
2076 Writes owner section to repository file.
2078 void CIniFileOut::WriteOwnerSectionL(TUid aOwner)
2080 if (aOwner.iUid != 0)
2082 WriteLineL(KOwnerSection());
2084 buf.Format(KUidFormat, aOwner.iUid);
2091 Writes time stamp to repository file.
2092 @param aTime Time stamp
2093 @leave System-wide error codes
2095 void CIniFileOut::WriteTimeStampL(const TTime& aTime)
2097 if(aTime.Int64() != 0)
2099 WriteLineL(KTimeStampSection());
2101 buf.Num(aTime.Int64());
2108 Writes meta data to repository file.
2109 @param aFileIn Input repository file
2110 @leave System-wide error codes
2112 void CIniFileOut::WriteMetaDataL(TUint32 aDefaultMeta,
2113 const RDefaultMetaArray& aDefaultMetaRanges)
2115 if (!aDefaultMeta && !aDefaultMetaRanges.Count())
2120 WriteLineL(KDefaultMetaSection);
2124 iBuf.Format(KHexIntFormat, aDefaultMeta);
2128 for (TInt i = 0; i<aDefaultMetaRanges.Count(); i++)
2130 const TSettingsDefaultMeta& entry = aDefaultMetaRanges[i];
2131 if (entry.HighKey())
2133 iBuf.Format(KRangeMetaFmt, entry.LowKey(), entry.HighKey(),
2134 entry.GetDefaultMetadata());
2138 iBuf.Format(KMaskMetaFmt, entry.LowKey(), entry.KeyMask(),
2139 entry.GetDefaultMetadata());
2144 WriteLineL(KCrNl());
2148 Writes platsec info to repository file.
2149 @param aFileIn Input repository file
2150 @leave System-wide error codes
2152 #ifdef SYMBIAN_CENTREP_SUPPORT_MULTIROFS
2153 void CIniFileOut::WritePlatSecL(const TSettingsAccessPolicy& aDefaultAccessPolicy,
2154 const RRangePolicyArray& aRangePolicies,TUint32 aCreVersion)
2156 void CIniFileOut::WritePlatSecL(const TSecurityPolicy& aDefaultReadPolicy,
2157 const TSecurityPolicy& aDefaultWritePolicy,
2158 const RRangePolicyArray& aRangePolicies)
2161 WriteLineL(KPlatSecSection);
2164 #ifdef SYMBIAN_CENTREP_SUPPORT_MULTIROFS
2165 if (aCreVersion<2 || (aCreVersion>=2 && aDefaultAccessPolicy.iHighKey!=0))
2166 AppendSecurityPolicyL(*(aDefaultAccessPolicy.GetReadAccessPolicy()), ECapReadAccess);
2167 iBuf.Append(KSpace);
2168 if (aCreVersion<2 || (aCreVersion>=2 && aDefaultAccessPolicy.iKeyMask!=0))
2169 AppendSecurityPolicyL(*(aDefaultAccessPolicy.GetWriteAccessPolicy()), ECapWriteAccess);
2171 AppendSecurityPolicyL(aDefaultReadPolicy, ECapReadAccess);
2172 iBuf.Append(KSpace);
2173 AppendSecurityPolicyL(aDefaultWritePolicy, ECapWriteAccess);
2177 for(TInt i=0; i < aRangePolicies.Count(); i++)
2179 const TSettingsAccessPolicy& e = aRangePolicies[i];
2180 if (e.iHighKey != 0)
2182 iBuf.Format(KRangePrefix, e.iLowKey, e.iHighKey);
2186 iBuf.Format(KMaskPrefix, e.iLowKey, e.iKeyMask);
2189 iBuf.Append(KSpace);
2191 AppendSecurityPolicyL(e.iReadAccessPolicy, ECapReadAccess);
2192 iBuf.Append(KSpace);
2193 AppendSecurityPolicyL(e.iWriteAccessPolicy, ECapWriteAccess);
2197 WriteLineL(KCrNl());
2200 void CIniFileOut::AppendSecurityPolicyL(const TSecurityPolicy& aPolicy,
2201 TCapAccessMode aRdWrMode)
2203 TCompiledSecurityPolicy policy(aPolicy);
2204 iBuf.Append(policy.TextualizePolicyL(aRdWrMode));
2207 /////////////////////////////////////////////////////////////////////////////////////////////////
2208 const TDesC& TCompiledSecurityPolicy::TextualizePolicyL(TCapAccessMode aMode)
2211 AppendModeHeader(aMode, EHdrCapability);
2213 switch (static_cast<TSecurityPolicy::TType>(iSecurityPolicy.iType))
2215 case TSecurityPolicy::ETypeFail:
2216 iBuf.Append(KAccessAlwaysFail);
2218 case TSecurityPolicy::ETypePass:
2219 iBuf.Append(KAccessAlwaysPass);
2221 case TSecurityPolicy::ETypeC3:
2222 DoCapabilitySection(3);
2224 case TSecurityPolicy::ETypeC7:
2225 DoCapabilitySection(7);
2227 case TSecurityPolicy::ETypeS3:
2228 iBuf.Zero(); // erase the "cap_rd", replace with sid_rd
2229 AppendModeHeader(aMode, EHdrSecureId);
2230 iBuf.AppendNum(iSecurityPolicy.iSecureId);
2232 if (ECapability_HardLimit != iSecurityPolicy.iCaps[0])
2234 iBuf.Append(KSpace);
2235 AppendModeHeader(aMode, EHdrCapability);
2236 DoCapabilitySection(3);
2241 User::Leave(KErrCorrupt);
2247 TCapability TCompiledSecurityPolicy::CapabilityAt(TInt aIndex) const
2251 return static_cast <TCapability> (iSecurityPolicy.iCaps[aIndex]);
2255 return static_cast <TCapability> (iSecurityPolicy.iExtraCaps[aIndex - 3]);
2257 return ECapability_None;
2261 void TCompiledSecurityPolicy::DoCapabilitySection(TInt aMaxNumCaps)
2263 for (TInt i = 0; i < aMaxNumCaps; i++)
2265 TCapability cap = CapabilityAt(i);
2267 if (cap<0 || cap>= ECapability_Limit)
2276 for (const char* p=CapabilityNames[cap]; *p; p++)
2278 iBuf.Append((TUint16)*p);
2283 void TCompiledSecurityPolicy::AppendModeHeader(TCapAccessMode aAccessMode,
2286 if (aAccessMode == ECapReadAccess)
2288 if (aType == EHdrSecureId)
2290 iBuf.Append(KReadAccessSidString); // "sid_rd"
2294 iBuf.Append(KReadAccessCapString); // "cap_rd"
2299 if (aType == EHdrSecureId)
2301 iBuf.Append(KWriteAccessSidString); // "sid_wr"
2305 iBuf.Append(KWriteAccessCapString); // "cap_wr"
2310 #endif //CENTREP_CONV_TOOL