os/security/authorisation/userpromptservice/policies/test/dumppolicy/resource/examplepolicy.rss
author sl@SLION-WIN7.fritz.box
Fri, 15 Jun 2012 03:10:57 +0200
changeset 0 bde4ae8d615e
permissions -rw-r--r--
First public contribution.
     1 /*
     2 * Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
     3 * All rights reserved.
     4 * This component and the accompanying materials are made available
     5 * under the terms of the License "Eclipse Public License v1.0"
     6 * which accompanies this distribution, and is available
     7 * at the URL "http://www.eclipse.org/legal/epl-v10.html".
     8 *
     9 * Initial Contributors:
    10 * Nokia Corporation - initial contribution.
    11 *
    12 * Contributors:
    13 *
    14 * Description: 
    15 *
    16 */
    17 
    18 
    19 #include <ups/policies.rh>
    20 
    21 UID2 KUidUpsPolicyResourceFile
    22 UID3 0x01100001					
    23 
    24 RESOURCE POLICIES testpolicies
    25 	{
    26 	header = POLICY_HEADER
    27 		{
    28 		// Built-in (protected SID and loaded from Z drive) client applications
    29 		// do not require authorisation from the UPS if the client has the correct
    30 		// capabilities.
    31 		authorisationpolicy = ECheckPostManufacture;
    32 		dialogcreator = 0x10283694;
    33 		policyevaluator = 0x10283698;
    34 		};
    35 	policies = 
    36 		{
    37 		POLICY
    38 			{
    39 			// sid_list defined so this field will be ignored
    40 			sid_classes = KSidClassF;				
    41 			// Silently accept this SID
    42 			sid_list = {0x01000030};
    43 			destination = "*";
    44 			options = KYes;
    45 			},			
    46 		POLICY
    47 			{
    48 			// Silently these SIDs for a specific destination
    49 			sid_list = {0x01000031,0x01000032};
    50 			destination = "*WLAN*";
    51 			options = KYes;
    52 			},			
    53 		POLICY
    54 			{
    55 			// For protected SIDs enable the Always and Never options
    56             // if the client has the correct capability.
    57 			sid_classes = KProtectedSids;
    58 			systemserversecurity = ESystemServerSecurityPassed;
    59 			destination = "*";
    60 			options = KYes|KNo|KAlways|KNever;
    61 			policyevaluator = 0x01000020;
    62 			dialogcreator = 0x01000021;
    63 			},
    64 		POLICY
    65 			{
    66 			// Unprotected SIDs may only get one-shot permissions            
    67 			sid_classes = KUnprotectedSids;
    68 			destination = "*";
    69 			options = KYes|KNo;
    70 			flags = 42; 		// Flags specific to policy evaluator 0x10283698
    71 			}
    72 		};
    73 	}
    74