sl@0: // Copyright (c) 1994-2009 Nokia Corporation and/or its subsidiary(-ies). sl@0: // All rights reserved. sl@0: // This component and the accompanying materials are made available sl@0: // under the terms of the License "Eclipse Public License v1.0" sl@0: // which accompanies this distribution, and is available sl@0: // at the URL "http://www.eclipse.org/legal/epl-v10.html". sl@0: // sl@0: // Initial Contributors: sl@0: // Nokia Corporation - initial contribution. sl@0: // sl@0: // Contributors: sl@0: // sl@0: // Description: sl@0: // e32\include\e32cmn.h sl@0: // sl@0: // sl@0: sl@0: #ifndef __E32CMN_H__ sl@0: #define __E32CMN_H__ sl@0: #include sl@0: sl@0: extern "C" { sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: A Nanokernel utility function that compares two memory buffers for equality. sl@0: sl@0: The two buffers are considered equal only if: sl@0: sl@0: 1. the buffers have the same length sl@0: sl@0: and sl@0: sl@0: 2. the binary content of both buffers is the same. sl@0: sl@0: @param aLeft The start address of the first buffer in the comparison. sl@0: @param aLeftLen The length of the first buffer in the comparison. sl@0: @param aRight The start address of the second buffer in the comparison. sl@0: @param aRightLen The length of the second buffer in the comparison. sl@0: sl@0: @return Zero if both buffers are equal; non-zero, otherwise. sl@0: sl@0: @panic USER 88 In debug mode only, if aLeftL is negative, sl@0: and the function is called on the user side. sl@0: @panic KERN-COMMON 88 In debug mode only, if aLeftL is negative, sl@0: and the function is called on the kernel side. sl@0: @panic USER 89 In debug mode only, if aRightL is negative, sl@0: and the function is called on the user side. sl@0: @panic KERN-COMMON 89 In debug mode only, if aRightL is negative, sl@0: and the function is called on the kernel side. sl@0: */ sl@0: IMPORT_C TInt memcompare(const TUint8* aLeft, TInt aLeftLen, const TUint8* aRight, TInt aRightLen); sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: A Nanokernel utility function that moves (copies) bytes in memory. sl@0: sl@0: The function assumes that the addresses are aligned on word boundaries, sl@0: and that the length value is a multiple of 4. sl@0: sl@0: @param aTrg The target address. sl@0: @param aSrc The source address. sl@0: @param aLength The number of bytes to be moved. sl@0: sl@0: @return The target address. sl@0: sl@0: @panic USER 91 In debug mode only, if aLength is not a multiple of 4, sl@0: and the function is called on the user side. sl@0: @panic KERN-COMMON 91 In debug mode only, if aLength is not a multiple of 4, sl@0: and the function is called on the kernel side. sl@0: @panic USER 92 In debug mode only, if aSrc is not aligned on a word boundary, sl@0: and the function is called on the user side. sl@0: @panic KERN-COMMON 92 In debug mode only, if aSrc is not aligned on a word boundary, sl@0: and the function is called on the kernel side. sl@0: @panic USER 93 In debug mode only, if aTrg is not aligned on a word boundary, sl@0: and the function is called on the user side. sl@0: @panic KERN-COMMON 93 In debug mode only, if aTrg is not aligned on a word boundary, sl@0: and the function is called on the kernel side. sl@0: */ sl@0: IMPORT_C TAny* wordmove(TAny* aTrg, const TAny* aSrc, unsigned int aLength); sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: A Nanokernel utility function that sets the specified number of bytes sl@0: to binary zero. sl@0: sl@0: @param aTrg The start address. sl@0: @param aLength The number of bytes to be set. sl@0: sl@0: @return The target address. sl@0: */ sl@0: IMPORT_C TAny* memclr(TAny* aTrg, unsigned int aLength); sl@0: } sl@0: sl@0: sl@0: sl@0: sl@0: #ifndef __TOOLS__ sl@0: extern "C" { sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: A Nanokernel utility function that sets all of the specified number of bytes to sl@0: the specified fill value. sl@0: sl@0: @param aTrg The start address. sl@0: @param aValue The fill value (the first or junior byte). sl@0: @param aLength The number of bytes to be set. sl@0: sl@0: @return The target address. sl@0: */ sl@0: IMPORT_C TAny* memset(TAny* aTrg, TInt aValue, unsigned int aLength); sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: A Nanokernel utility function that copies bytes in memory. sl@0: sl@0: @param aTrg The target address. sl@0: @param aSrc The source address. sl@0: @param aLength The number of bytes to be moved. sl@0: sl@0: @return The target address. sl@0: */ sl@0: IMPORT_C TAny* memcpy(TAny* aTrg, const TAny* aSrc, unsigned int aLength); sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: A Nanokernel utility function that moves (copies) bytes in memory. sl@0: sl@0: @param aTrg The target address. sl@0: @param aSrc The source address. sl@0: @param aLength The number of bytes to be moved. sl@0: sl@0: @return The target address. sl@0: */ sl@0: IMPORT_C TAny* memmove(TAny* aTrg, const TAny* aSrc, unsigned int aLength); sl@0: } sl@0: #else sl@0: #include sl@0: #endif sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Tests whether the specified value is less than or equal to the sl@0: specified upper limit. sl@0: sl@0: @param aVal The value to be tested. sl@0: @param aLimit The upper limit. sl@0: sl@0: @return True, if the value is less than or equal to the specified upper limit; sl@0: false, otherwise. sl@0: */ sl@0: inline TInt Lim(TInt aVal,TUint aLimit) sl@0: {return(((TUint)aVal)<=aLimit);} sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Tests whether the specified value is strictly less than the sl@0: specified upper limit. sl@0: sl@0: @param aVal The value to be tested. sl@0: @param aLimit The upper limit. sl@0: sl@0: @return True, if the value is strictly less than the specified upper limit; sl@0: false, otherwise. sl@0: */ sl@0: inline TInt LimX(TInt aVal,TUint aLimit) sl@0: {return(((TUint)aVal) sl@0: inline T Min(T aLeft,T aRight) sl@0: {return(aLeft sl@0: inline T Min(T aLeft,TUint aRight) sl@0: {return(aLeft<(TInt)aRight ? aLeft : (T)aRight);} sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Returns the larger of two values. sl@0: sl@0: @param aLeft The first value to be compared. sl@0: @param aRight The second value to be compared. sl@0: sl@0: @return The larger value. sl@0: */ sl@0: template sl@0: inline T Max(T aLeft,T aRight) sl@0: {return(aLeft sl@0: inline T Max(T aLeft,TUint aRight) sl@0: {return(aLeft<(TInt)aRight ? (TInt)aRight : aLeft);} sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Returns an absolute value. sl@0: sl@0: @param aVal The source value. sl@0: sl@0: @return The absolute value sl@0: */ sl@0: template sl@0: inline T Abs(T aVal) sl@0: {return(aVal<0 ? -aVal : aVal);} sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Determines whether a specified value lies within a defined range of values. sl@0: sl@0: @param aMin The lower value of the range. sl@0: @param aVal The value to be compared. sl@0: @param aMax The higher value of the range. sl@0: sl@0: @return True, if the specified value lies within the range; false, otherwise. sl@0: */ sl@0: template sl@0: inline TBool Rng(T aMin,T aVal,T aMax) sl@0: {return(aVal>=aMin && aVal<=aMax);} sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Adds a value to a pointer. sl@0: sl@0: @param aPtr Pointer to an object of type T. sl@0: @param aVal The value to be added. sl@0: sl@0: @return The resulting pointer value, as a pointer to a type T. sl@0: */ sl@0: template sl@0: inline T* PtrAdd(T* aPtr,S aVal) sl@0: {return((T*)(((TUint8*)aPtr)+aVal));} sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Subtracts a value from a pointer. sl@0: sl@0: @param aPtr Pointer to an object of type T. sl@0: @param aVal The value to be added. sl@0: sl@0: @return The resulting pointer value, as a pointer to a type T. sl@0: */ sl@0: template sl@0: inline T* PtrSub(T* aPtr,S aVal) sl@0: {return((T*)(((TUint8*)aPtr)-aVal));} sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Aligns the specified value onto a 2-byte boundary. sl@0: sl@0: @param aValue The value to be aligned. sl@0: sl@0: @return The aligned value. sl@0: */ sl@0: template sl@0: inline T Align2(T aValue) sl@0: {return((T)((((TUint)aValue)+sizeof(TUint16)-1)&~(sizeof(TUint16)-1)));} sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Aligns the specified value onto a 4-byte boundary. sl@0: sl@0: @param aValue The value to be aligned. sl@0: sl@0: @return The aligned value. sl@0: */ sl@0: template sl@0: inline T Align4(T aValue) sl@0: {return((T)((((TUint)aValue)+sizeof(TUint32)-1)&~(sizeof(TUint32)-1)));} sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: A templated class which encapsulates a reference to an object within a wrapper. sl@0: sl@0: The wrapper object can be passed to a function as a value type. This allows sl@0: a reference to be passed to a function as a value type. sl@0: sl@0: This wrapper object is commonly termed a value reference. sl@0: */ sl@0: template sl@0: class TRefByValue sl@0: { sl@0: public: sl@0: inline TRefByValue(T& aRef); sl@0: inline operator T&(); sl@0: private: sl@0: TRefByValue& operator=(TRefByValue aRef); sl@0: private: sl@0: T &iRef; sl@0: }; sl@0: sl@0: sl@0: sl@0: sl@0: #if !defined (__KERNEL_MODE__) sl@0: class TDesC16; // forward declaration for TChar member functions sl@0: class TPtrC16; // forward declaration for TChar member functions sl@0: #endif sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Holds a character value and provides a number of utility functions to sl@0: manipulate it and test its properties. sl@0: sl@0: For example, there are functions to convert the character sl@0: to uppercase and test whether or not it is a control character. sl@0: sl@0: The character value is stored as a 32-bit unsigned integer. The shorthand sl@0: "TChar value" is used to describe the character value wrapped by a TChar sl@0: object. sl@0: sl@0: TChar can be used to represent Unicode values outside plane 0 (that is, the sl@0: extended Unicode range from 0x10000 to 0xFFFFF). This differentiates it from sl@0: TText which can only be used for 16-bit Unicode character values. sl@0: sl@0: @see TText sl@0: */ sl@0: class TChar sl@0: { sl@0: public: sl@0: sl@0: sl@0: /** sl@0: General Unicode character category. sl@0: sl@0: The high nibble encodes the major category (Mark, Number, etc.) and a low sl@0: nibble encodes the subdivisions of that category. sl@0: sl@0: The category codes can be used in three ways: sl@0: sl@0: (i) as unique constants: there is one for each Unicode category, with a sl@0: name of the form sl@0: @code sl@0: ECategory sl@0: @endcode sl@0: where sl@0: @code sl@0: sl@0: @endcode sl@0: is the category name given by sl@0: the Unicode database (e.g., the constant ELuCategory is used for lowercase sl@0: letters, category Lu); sl@0: sl@0: (ii) as numbers in certain ranges: letter categories are all <= EMaxLetterCategory; sl@0: sl@0: (iii) as codes in which the upper nibble gives the category group sl@0: (e.g., punctuation categories all yield TRUE for sl@0: the test (category & 0xF0) ==EPunctuationGroup). sl@0: */ sl@0: enum TCategory sl@0: { sl@0: /** sl@0: Alphabetic letters. sl@0: sl@0: Includes ELuCategory, ELlCategory and ELtCategory. sl@0: */ sl@0: EAlphaGroup = 0x00, sl@0: sl@0: sl@0: /** sl@0: Other letters. sl@0: sl@0: Includes ELoCategory. sl@0: */ sl@0: ELetterOtherGroup = 0x10, sl@0: sl@0: sl@0: /** sl@0: Letter modifiers. sl@0: sl@0: Includes ELmCategory. sl@0: */ sl@0: ELetterModifierGroup = 0x20, sl@0: sl@0: sl@0: /** sl@0: Marks group. sl@0: sl@0: Includes EMnCategory, EMcCategory and EMeCategory. sl@0: */ sl@0: EMarkGroup = 0x30, sl@0: sl@0: sl@0: /** sl@0: Numbers group. sl@0: sl@0: Includes ENdCategory, ENlCategory and ENoCategory. sl@0: */ sl@0: ENumberGroup = 0x40, sl@0: sl@0: sl@0: /** sl@0: Punctuation group. sl@0: sl@0: IncludesEPcCategory, PdCategory, EpeCategory, EPsCategory and EPoCategory. sl@0: */ sl@0: EPunctuationGroup = 0x50, sl@0: sl@0: sl@0: /** sl@0: Symbols group. sl@0: sl@0: Includes ESmCategory, EScCategory, ESkCategory and ESoCategory. sl@0: */ sl@0: ESymbolGroup = 0x60, sl@0: sl@0: sl@0: /** sl@0: Separators group. sl@0: sl@0: Includes EZsCategory, EZlCategory and EZlpCategory. sl@0: */ sl@0: ESeparatorGroup = 0x70, sl@0: sl@0: sl@0: /** sl@0: Control, format, private use, unassigned. sl@0: sl@0: Includes ECcCategory, ECtCategory, ECsCategory, sl@0: ECoCategory and ECnCategory. sl@0: */ sl@0: EControlGroup = 0x80, sl@0: sl@0: sl@0: /** sl@0: The highest possible groups category. sl@0: */ sl@0: EMaxAssignedGroup = 0xE0, sl@0: sl@0: sl@0: /** sl@0: Unassigned to any other group. sl@0: */ sl@0: EUnassignedGroup = 0xF0, sl@0: sl@0: sl@0: /** sl@0: Letter, Uppercase. sl@0: */ sl@0: ELuCategory = EAlphaGroup | 0, sl@0: sl@0: sl@0: /** sl@0: Letter, Lowercase. sl@0: */ sl@0: ELlCategory = EAlphaGroup | 1, sl@0: sl@0: sl@0: /** sl@0: Letter, Titlecase. sl@0: */ sl@0: ELtCategory = EAlphaGroup | 2, sl@0: sl@0: sl@0: /** sl@0: Letter, Other. sl@0: */ sl@0: ELoCategory = ELetterOtherGroup | 0, sl@0: sl@0: sl@0: /** sl@0: The highest possible (non-modifier) letter category. sl@0: */ sl@0: EMaxLetterCategory = ELetterOtherGroup | 0x0F, sl@0: sl@0: /** sl@0: Letter, Modifier. sl@0: */ sl@0: ELmCategory = ELetterModifierGroup | 0, sl@0: sl@0: sl@0: /** sl@0: The highest possible letter category. sl@0: */ sl@0: EMaxLetterOrLetterModifierCategory = ELetterModifierGroup | 0x0F, sl@0: sl@0: /** sl@0: Mark, Non-Spacing sl@0: */ sl@0: EMnCategory = EMarkGroup | 0, sl@0: sl@0: sl@0: /** sl@0: Mark, Combining. sl@0: */ sl@0: EMcCategory = EMarkGroup | 1, sl@0: sl@0: sl@0: /** sl@0: Mark, Enclosing. sl@0: */ sl@0: EMeCategory = EMarkGroup | 2, sl@0: sl@0: sl@0: /** sl@0: Number, Decimal Digit. sl@0: */ sl@0: ENdCategory = ENumberGroup | 0, sl@0: sl@0: sl@0: /** sl@0: Number, Letter. sl@0: */ sl@0: ENlCategory = ENumberGroup | 1, sl@0: sl@0: sl@0: /** sl@0: Number, Other. sl@0: */ sl@0: ENoCategory = ENumberGroup | 2, sl@0: sl@0: sl@0: /** sl@0: Punctuation, Connector. sl@0: */ sl@0: EPcCategory = EPunctuationGroup | 0, sl@0: sl@0: sl@0: /** sl@0: Punctuation, Dash. sl@0: */ sl@0: EPdCategory = EPunctuationGroup | 1, sl@0: sl@0: sl@0: /** sl@0: Punctuation, Open. sl@0: */ sl@0: EPsCategory = EPunctuationGroup | 2, sl@0: sl@0: sl@0: /** sl@0: Punctuation, Close. sl@0: */ sl@0: EPeCategory = EPunctuationGroup | 3, sl@0: sl@0: sl@0: /** sl@0: Punctuation, Initial Quote sl@0: */ sl@0: EPiCategory = EPunctuationGroup | 4, sl@0: sl@0: sl@0: /** sl@0: Punctuation, Final Quote sl@0: */ sl@0: EPfCategory = EPunctuationGroup | 5, sl@0: sl@0: sl@0: /** sl@0: Punctuation, Other. sl@0: */ sl@0: EPoCategory = EPunctuationGroup | 6, sl@0: sl@0: sl@0: /** sl@0: Symbol, Math. sl@0: */ sl@0: ESmCategory = ESymbolGroup | 0, sl@0: sl@0: sl@0: /** sl@0: Symbol, Currency. sl@0: */ sl@0: EScCategory = ESymbolGroup | 1, sl@0: sl@0: sl@0: /** sl@0: Symbol, Modifier. sl@0: */ sl@0: ESkCategory = ESymbolGroup | 2, sl@0: sl@0: sl@0: /** sl@0: Symbol, Other. sl@0: */ sl@0: ESoCategory = ESymbolGroup | 3, sl@0: sl@0: sl@0: /** sl@0: The highest possible graphic character category. sl@0: */ sl@0: EMaxGraphicCategory = ESymbolGroup | 0x0F, sl@0: sl@0: sl@0: /** sl@0: Separator, Space. sl@0: */ sl@0: EZsCategory = ESeparatorGroup | 0, sl@0: sl@0: sl@0: /** sl@0: The highest possible printable character category. sl@0: */ sl@0: EMaxPrintableCategory = EZsCategory, sl@0: sl@0: sl@0: /** sl@0: Separator, Line. sl@0: */ sl@0: EZlCategory = ESeparatorGroup | 1, sl@0: sl@0: sl@0: /** sl@0: Separator, Paragraph. sl@0: */ sl@0: EZpCategory = ESeparatorGroup | 2, sl@0: sl@0: sl@0: /** sl@0: Other, Control. sl@0: */ sl@0: ECcCategory = EControlGroup | 0, sl@0: sl@0: sl@0: /** sl@0: Other, Format. sl@0: */ sl@0: ECfCategory = EControlGroup | 1, sl@0: sl@0: sl@0: /** sl@0: The highest possible category for assigned 16-bit characters; does not sl@0: include surrogates, which are interpreted as pairs and have no meaning sl@0: on their own. sl@0: */ sl@0: EMaxAssignedCategory = EMaxAssignedGroup | 0x0F, sl@0: sl@0: sl@0: /** sl@0: Other, Surrogate. sl@0: */ sl@0: ECsCategory = EUnassignedGroup | 0, sl@0: sl@0: sl@0: /** sl@0: Other, Private Use. sl@0: */ sl@0: ECoCategory = EUnassignedGroup | 1, sl@0: sl@0: sl@0: /** sl@0: Other, Not Assigned. sl@0: */ sl@0: ECnCategory = EUnassignedGroup | 2 sl@0: }; sl@0: sl@0: sl@0: /** sl@0: The bi-directional Unicode character category. sl@0: sl@0: For more information on the bi-directional algorithm, see Unicode Technical sl@0: Report No. 9 available at: http://www.unicode.org/unicode/reports/tr9. sl@0: */ sl@0: enum TBdCategory sl@0: { sl@0: /** sl@0: Left to right. sl@0: */ sl@0: ELeftToRight, // L Left-to-Right sl@0: sl@0: sl@0: /** sl@0: Left to right embedding. sl@0: */ sl@0: ELeftToRightEmbedding, // LRE Left-to-Right Embedding sl@0: sl@0: sl@0: /** sl@0: Left-to-Right Override. sl@0: */ sl@0: ELeftToRightOverride, // LRO Left-to-Right Override sl@0: sl@0: sl@0: /** sl@0: Right to left. sl@0: */ sl@0: ERightToLeft, // R Right-to-Left sl@0: sl@0: sl@0: /** sl@0: Right to left Arabic. sl@0: */ sl@0: ERightToLeftArabic, // AL Right-to-Left Arabic sl@0: sl@0: sl@0: /** sl@0: Right to left embedding. sl@0: */ sl@0: ERightToLeftEmbedding, // RLE Right-to-Left Embedding sl@0: sl@0: sl@0: /** sl@0: Right-to-Left Override. sl@0: */ sl@0: ERightToLeftOverride, // RLO Right-to-Left Override sl@0: sl@0: sl@0: /** sl@0: Pop Directional Format. sl@0: */ sl@0: EPopDirectionalFormat, // PDF Pop Directional Format sl@0: sl@0: sl@0: /** sl@0: European number. sl@0: */ sl@0: EEuropeanNumber, // EN European Number sl@0: sl@0: sl@0: /** sl@0: European number separator. sl@0: */ sl@0: EEuropeanNumberSeparator, // ES European Number Separator sl@0: sl@0: sl@0: /** sl@0: European number terminator. sl@0: */ sl@0: EEuropeanNumberTerminator, // ET European Number Terminator sl@0: sl@0: sl@0: /** sl@0: Arabic number. sl@0: */ sl@0: EArabicNumber, // AN Arabic Number sl@0: sl@0: sl@0: /** sl@0: Common number separator. sl@0: */ sl@0: ECommonNumberSeparator, // CS Common Number Separator sl@0: sl@0: sl@0: /** sl@0: Non Spacing Mark. sl@0: */ sl@0: ENonSpacingMark, // NSM Non-Spacing Mark sl@0: sl@0: sl@0: /** sl@0: Boundary Neutral. sl@0: */ sl@0: EBoundaryNeutral, // BN Boundary Neutral sl@0: sl@0: sl@0: /** sl@0: Paragraph Separator. sl@0: */ sl@0: EParagraphSeparator, // B Paragraph Separator sl@0: sl@0: sl@0: /** sl@0: Segment separator. sl@0: */ sl@0: ESegmentSeparator, // S Segment Separator sl@0: sl@0: sl@0: /** sl@0: Whitespace sl@0: */ sl@0: EWhitespace, // WS Whitespace sl@0: sl@0: sl@0: /** sl@0: Other neutrals; all other characters: punctuation, symbols. sl@0: */ sl@0: EOtherNeutral // ON Other Neutrals sl@0: }; sl@0: sl@0: sl@0: /** sl@0: Notional character width as known to East Asian (Chinese, Japanese, sl@0: Korean (CJK)) coding systems. sl@0: */ sl@0: enum TCjkWidth sl@0: { sl@0: /** sl@0: Includes 'ambiguous width' defined in Unicode Technical Report 11: East Asian Width sl@0: */ sl@0: ENeutralWidth, sl@0: sl@0: sl@0: /** sl@0: Character which occupies a single cell. sl@0: */ sl@0: EHalfWidth, // other categories are as defined in the report sl@0: sl@0: sl@0: /** sl@0: Character which occupies 2 cells. sl@0: */ sl@0: EFullWidth, sl@0: sl@0: sl@0: /** sl@0: Characters that are always narrow and have explicit full-width sl@0: counterparts. All of ASCII is an example of East Asian Narrow sl@0: characters. sl@0: */ sl@0: ENarrow, sl@0: sl@0: /** sl@0: Characters that are always wide. This category includes characters that sl@0: have explicit half-width counterparts. sl@0: */ sl@0: EWide sl@0: }; sl@0: sl@0: sl@0: /** sl@0: @deprecated sl@0: sl@0: Encoding systems used by the translation functions. sl@0: */ sl@0: enum TEncoding sl@0: { sl@0: /** sl@0: The Unicode encoding. sl@0: */ sl@0: EUnicode, sl@0: sl@0: sl@0: /** sl@0: The shift-JIS encoding (used in Japan). sl@0: */ sl@0: EShiftJIS sl@0: }; sl@0: sl@0: sl@0: /** sl@0: Flags defining operations to be performed using TChar::Fold(). sl@0: sl@0: The flag values are passed to the Fold() funtion. sl@0: sl@0: @see TChar::Fold sl@0: */ sl@0: enum sl@0: { sl@0: /** sl@0: Convert characters to their lower case form if any. sl@0: */ sl@0: EFoldCase = 1, sl@0: sl@0: sl@0: /** sl@0: Strip accents sl@0: */ sl@0: EFoldAccents = 2, sl@0: sl@0: sl@0: /** sl@0: Convert digits representing values 0..9 to characters '0'..'9' sl@0: */ sl@0: EFoldDigits = 4, sl@0: sl@0: sl@0: /** sl@0: Convert all spaces (ordinary, fixed-width, ideographic, etc.) to ' ' sl@0: */ sl@0: EFoldSpaces = 8, sl@0: sl@0: sl@0: /** sl@0: Convert hiragana to katakana. sl@0: */ sl@0: EFoldKana = 16, sl@0: sl@0: sl@0: /** sl@0: Fold fullwidth and halfwidth variants to their standard forms sl@0: */ sl@0: EFoldWidth = 32, sl@0: sl@0: sl@0: /** sl@0: Perform standard folding operations, i.e.those done by Fold() with no argument sl@0: */ sl@0: EFoldStandard = EFoldCase | EFoldAccents | EFoldDigits | EFoldSpaces, sl@0: sl@0: sl@0: /** sl@0: Perform all possible folding operations sl@0: */ sl@0: EFoldAll = -1 sl@0: }; sl@0: sl@0: sl@0: struct TCharInfo sl@0: /** sl@0: A structure to hold information about a Unicode character. sl@0: sl@0: An object of this type is passed to TChar::GetInfo(). sl@0: sl@0: @see TChar::GetInfo sl@0: */ sl@0: { sl@0: /** sl@0: General category. sl@0: */ sl@0: TCategory iCategory; sl@0: sl@0: sl@0: /** sl@0: Bi-directional category. sl@0: */ sl@0: TBdCategory iBdCategory; sl@0: sl@0: sl@0: /** sl@0: Combining class: number (currently) in the range 0..234 sl@0: */ sl@0: TInt iCombiningClass; sl@0: sl@0: sl@0: /** sl@0: Lower case form. sl@0: */ sl@0: TUint iLowerCase; sl@0: sl@0: sl@0: /** sl@0: Upper case form. sl@0: */ sl@0: TUint iUpperCase; sl@0: sl@0: sl@0: /** sl@0: Title case form. sl@0: */ sl@0: TUint iTitleCase; sl@0: sl@0: sl@0: /** sl@0: True, if the character is mirrored. sl@0: */ sl@0: TBool iMirrored; sl@0: sl@0: sl@0: /** sl@0: Integer numeric value: -1 if none, -2 if a fraction. sl@0: */ sl@0: TInt iNumericValue; sl@0: }; sl@0: sl@0: inline TChar(); sl@0: inline TChar(TUint aChar); sl@0: inline TChar& operator-=(TUint aChar); sl@0: inline TChar& operator+=(TUint aChar); sl@0: inline TChar operator-(TUint aChar); sl@0: inline TChar operator+(TUint aChar); sl@0: inline operator TUint() const; sl@0: #ifndef __KERNEL_MODE__ sl@0: inline void Fold(); sl@0: inline void LowerCase(); sl@0: inline void UpperCase(); sl@0: inline TBool Eos() const; sl@0: IMPORT_C TUint GetUpperCase() const; sl@0: IMPORT_C TUint GetLowerCase() const; sl@0: IMPORT_C TBool IsLower() const; sl@0: IMPORT_C TBool IsUpper() const; sl@0: IMPORT_C TBool IsAlpha() const; sl@0: IMPORT_C TBool IsDigit() const; sl@0: IMPORT_C TBool IsAlphaDigit() const; sl@0: IMPORT_C TBool IsHexDigit() const; sl@0: IMPORT_C TBool IsSpace() const; sl@0: IMPORT_C TBool IsPunctuation() const; sl@0: IMPORT_C TBool IsGraph() const; sl@0: IMPORT_C TBool IsPrint() const; sl@0: IMPORT_C TBool IsControl() const; sl@0: inline void Fold(TInt aFlags); sl@0: inline void TitleCase(); sl@0: IMPORT_C TUint GetTitleCase() const; sl@0: IMPORT_C TBool IsTitle() const; sl@0: IMPORT_C TBool IsAssigned() const; sl@0: IMPORT_C void GetInfo(TCharInfo& aInfo) const; sl@0: IMPORT_C TCategory GetCategory() const; sl@0: IMPORT_C TBdCategory GetBdCategory() const; sl@0: IMPORT_C TInt GetCombiningClass() const; sl@0: IMPORT_C TBool IsMirrored() const; sl@0: IMPORT_C TInt GetNumericValue() const; sl@0: IMPORT_C TCjkWidth GetCjkWidth() const; sl@0: IMPORT_C static TBool Compose(TUint& aResult,const TDesC16& aSource); sl@0: IMPORT_C TBool Decompose(TPtrC16& aResult) const; sl@0: sl@0: protected: sl@0: inline void SetChar(TUint aChar); sl@0: #endif sl@0: private: sl@0: TUint iChar; sl@0: __DECLARE_TEST; sl@0: }; sl@0: sl@0: #include sl@0: #ifndef __KERNEL_MODE__ sl@0: #include sl@0: #endif sl@0: sl@0: sl@0: sl@0: sl@0: #if defined(_UNICODE) && !defined(__KERNEL_MODE__) sl@0: #define __Size (sizeof(TUint)/sizeof(TUint16)) sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Defines a build-independent non-modifiable descriptor. sl@0: sl@0: A 16-bit build variant is generated for a Unicode, non-kernel sl@0: mode build. sl@0: sl@0: A build-independent type should always be used unless an explicit 8-bit sl@0: or 16-bit type is required. sl@0: sl@0: @see TDesC8 sl@0: @see TDesC16 sl@0: */ sl@0: typedef TDesC16 TDesC; sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Defines a build-independent non-modifiable pointer descriptor. sl@0: sl@0: A 16-bit build variant is generated for a Unicode, non-kernel sl@0: mode build. sl@0: sl@0: A build-independent type should always be used unless an explicit 8-bit sl@0: or 16-bit type is required. sl@0: sl@0: @see TPtrC8 sl@0: @see TPtrC16 sl@0: */ sl@0: typedef TPtrC16 TPtrC; sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Defines a build-independent modifiable descriptor. sl@0: sl@0: A 16-bit build variant is generated for a Unicode, non-kernel sl@0: mode build. sl@0: sl@0: A build-independent type should always be used unless an explicit 8-bit sl@0: or 16-bit type is required. sl@0: sl@0: @see TDes8 sl@0: @see TDes16 sl@0: */ sl@0: typedef TDes16 TDes; sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Defines a build-independent modifiable pointer descriptor. sl@0: sl@0: A 16-bit build variant is generated for a Unicode, non-kernel sl@0: mode build. sl@0: sl@0: A build-independent type should always be used unless an explicit 8-bit sl@0: or 16-bit type is required. sl@0: sl@0: @see TPtr8 sl@0: @see TPtr16 sl@0: */ sl@0: typedef TPtr16 TPtr; sl@0: sl@0: sl@0: sl@0: sl@0: #ifndef __KERNEL_MODE__ sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Defines a build-independent heap descriptor. sl@0: sl@0: A 16-bit build variant is generated for a Unicode, non-kernel sl@0: mode build. sl@0: sl@0: A build-independent type should always be used unless an explicit 8-bit sl@0: or 16-bit type is required. sl@0: sl@0: @see HBufC8 sl@0: @see HBufC16 sl@0: */ sl@0: typedef HBufC16 HBufC; sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Defines a build-independent descriptor overflow handler. sl@0: sl@0: A 16-bit build variant is generated for a Unicode, non-kernel sl@0: mode build. sl@0: sl@0: A build-independent type should always be used unless an explicit 8-bit sl@0: or 16-bit type is required. sl@0: sl@0: @see TDes8Overflow sl@0: @see TDes16Overflow sl@0: */ sl@0: typedef TDes16Overflow TDesOverflow; sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Defines a build-independent resizable buffer descriptor. sl@0: sl@0: A 16-bit build variant is generated for a Unicode, non-kernel mode build. sl@0: sl@0: A build-independent type should always be used unless an explicit 8-bit sl@0: or 16-bit type is required. sl@0: sl@0: @see RBuf8 sl@0: @see RBuf16 sl@0: */ sl@0: typedef RBuf16 RBuf; sl@0: sl@0: #endif sl@0: #else sl@0: #define __Size (sizeof(TUint)/sizeof(TUint8)) sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Defines a build-independent non-modifiable descriptor. sl@0: sl@0: An 8-bit build variant is generated for a non-Unicode build. sl@0: sl@0: This build-independent type should always be used unless an explicit 8-bit sl@0: or 16-bit build variant is required. sl@0: sl@0: @see TDesC8 sl@0: @see TDesC16 sl@0: */ sl@0: typedef TDesC8 TDesC; sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Defines a build-independent non-modifiable pointer descriptor. sl@0: sl@0: An 8-bit build variant is generated for a non-Unicode build. sl@0: sl@0: This build-independent type should always be used unless an explicit 8-bit sl@0: or 16-bit build variant is required. sl@0: sl@0: @see TPtrC8 sl@0: @see TPtrC16 sl@0: */ sl@0: typedef TPtrC8 TPtrC; sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Defines a build-independent modifiable descriptor. sl@0: sl@0: An 8-bit build variant is generated for a non-Unicode build. sl@0: sl@0: This build-independent type should always be used unless an explicit 8-bit sl@0: or 16-bit build variant is required. sl@0: sl@0: @see TDes8 sl@0: @see TDes16 sl@0: */ sl@0: typedef TDes8 TDes; sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Defines a build-independent modifiable pointer descriptor. sl@0: sl@0: An 8-bit build variant is generated for a non-Unicode build. sl@0: sl@0: This build-independent type should always be used unless an explicit 8-bit sl@0: or 16-bit build variant is required. sl@0: sl@0: @see TPtr8 sl@0: @see TPtr16 sl@0: */ sl@0: typedef TPtr8 TPtr; sl@0: #ifndef __KERNEL_MODE__ sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Defines a build-independent heap descriptor. sl@0: sl@0: An 8-bit build variant is generated for a non-Unicode, non-kernel sl@0: mode build. sl@0: sl@0: This build-independent type should always be used unless an explicit 8-bit sl@0: or 16-bit build variant is required. sl@0: sl@0: @see HBufC8 sl@0: @see HBufC16 sl@0: */ sl@0: typedef HBufC8 HBufC; sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Defines a build-independent descriptor overflow handler. sl@0: sl@0: An 8-bit build variant is generated for a non-Unicode, non-kernel sl@0: mode build. sl@0: sl@0: This build-independent type should always be used unless an explicit 8-bit sl@0: or 16-bit build variant is required. sl@0: sl@0: @see TDes8Overflow sl@0: @see TDes16Overflow sl@0: */ sl@0: typedef TDes8Overflow TDesOverflow; sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Defines a build-independent resizable buffer descriptor. sl@0: sl@0: An 8-bit build variant is generated for a non-Unicode, non-kernel mode build. sl@0: sl@0: This build-independent type should always be used unless an explicit 8-bit sl@0: or 16-bit build variant is required. sl@0: sl@0: @see RBuf8 sl@0: @see RBuf16 sl@0: */ sl@0: typedef RBuf8 RBuf; sl@0: sl@0: #endif sl@0: #endif sl@0: sl@0: sl@0: #if defined(_UNICODE) && !defined(__KERNEL_MODE__) sl@0: typedef TBufCBase16 TBufCBase; sl@0: #else sl@0: typedef TBufCBase8 TBufCBase; sl@0: #endif sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: A build-independent non-modifiable buffer descriptor. sl@0: sl@0: This is a descriptor class which provides a buffer of fixed length for sl@0: containing and accessing TUint16 or TUint8 data, depending on the build. sl@0: sl@0: The class intended for instantiation. The data that the descriptor represents sl@0: is part of the descriptor object itself. sl@0: sl@0: The class is templated, based on an integer value which defines the size of sl@0: the descriptor's data area. sl@0: sl@0: The data is intended to be accessed, but not modified; however, it can be sl@0: completely replaced using the assignment operators of this class. The base sl@0: class provides the functions through which the data is accessed. sl@0: sl@0: This class derives from TBufCBase16 for a Unicode, non-kernel build, but sl@0: derives from TBufCBase8 for a non-Unicode build. sl@0: sl@0: @see TDesC sl@0: @see TDesC8 sl@0: @see TDesC16 sl@0: @see TPtr sl@0: @see TPtr8 sl@0: @see TPtr16 sl@0: @see TBufC8 sl@0: @see TBufC16 sl@0: */ sl@0: template sl@0: #if defined(_UNICODE) && !defined(__KERNEL_MODE__) sl@0: class TBufC : public TBufCBase16 sl@0: #else sl@0: class TBufC : public TBufCBase8 sl@0: #endif sl@0: { sl@0: public: sl@0: inline TBufC(); sl@0: inline TBufC(const TText* aString); sl@0: inline TBufC(const TDesC& aDes); sl@0: inline TBufC& operator=(const TText* aString); sl@0: inline TBufC& operator=(const TDesC& aDes); sl@0: inline TPtr Des(); sl@0: private: sl@0: TText iBuf[__Align(S)]; sl@0: }; sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: A build-independent modifiable buffer descriptor. sl@0: sl@0: This is a descriptor class which provides a buffer of fixed length for sl@0: containing, accessing and manipulating TUint16 or TUint8 data, depending sl@0: on the build. sl@0: sl@0: The class is intended for instantiation. The data that the descriptor represents sl@0: is part of the descriptor object itself. sl@0: sl@0: The class is templated, based on an integer value which determines the size sl@0: of the data area created as part of the buffer descriptor object; this is sl@0: also the maximum length of the descriptor. sl@0: sl@0: The data is intended to be both accessed and modified. The base classes provide sl@0: the functions through which the data is accessed. sl@0: sl@0: This class derives from TBufCBase16 for a Unicode, non-kernel build, but sl@0: derives from TBufCBase8 for a non-Unicode build. sl@0: sl@0: @see TDesC sl@0: @see TDesC8 sl@0: @see TDesC16 sl@0: @see TDes sl@0: @see TDes8 sl@0: @see TDes16 sl@0: @see TPtr sl@0: @see TPtr8 sl@0: @see TPtr16 sl@0: */ sl@0: template sl@0: #if defined(_UNICODE) && !defined(__KERNEL_MODE__) sl@0: class TBuf : public TBufBase16 sl@0: #else sl@0: class TBuf : public TBufBase8 sl@0: #endif sl@0: { sl@0: public: sl@0: inline TBuf(); sl@0: inline explicit TBuf(TInt aLength); sl@0: inline TBuf(const TText* aString); sl@0: inline TBuf(const TDesC& aDes); sl@0: inline TBuf& operator=(const TText* aString); sl@0: inline TBuf& operator=(const TDesC& aDes); sl@0: inline TBuf& operator=(const TBuf& aBuf); sl@0: private: sl@0: TText iBuf[__Align(S)]; sl@0: }; sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Value reference used in operator TLitC::__TRefDesC(). sl@0: sl@0: @see TRefByValue sl@0: */ sl@0: typedef TRefByValue __TRefDesC; sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Encapsulates literal text. sl@0: sl@0: This is always constructed using an _LIT macro. sl@0: sl@0: This class is build independent; i.e. for a non-Unicode build, an 8-bit build sl@0: variant is generated; for a Unicode build, a 16 bit build variant is generated. sl@0: sl@0: The class has no explicit constructors. See the _LIT macro definition. sl@0: */ sl@0: template sl@0: class TLitC sl@0: { sl@0: public: sl@0: /** sl@0: @internalComponent sl@0: */ sl@0: enum {BufferSize=S-1}; sl@0: inline const TDesC* operator&() const; sl@0: inline operator const TDesC&() const; sl@0: inline const TDesC& operator()() const; sl@0: inline operator const __TRefDesC() const; sl@0: public: sl@0: #if !defined(_UNICODE) || defined(__KERNEL_MODE__) sl@0: sl@0: /** sl@0: @internalComponent sl@0: */ sl@0: typedef TUint8 __TText; sl@0: #elif defined(__GCC32__) sl@0: sl@0: /** sl@0: @internalComponent sl@0: */ sl@0: typedef wchar_t __TText; sl@0: #elif defined(__VC32__) sl@0: sl@0: /** sl@0: @internalComponent sl@0: */ sl@0: typedef wchar_t __TText; sl@0: sl@0: #elif defined(__CW32__) sl@0: sl@0: /** sl@0: @internalComponent sl@0: */ sl@0: typedef TUint16 __TText; sl@0: #elif !defined(__TText_defined) sl@0: #error no typedef for __TText sl@0: #endif sl@0: public: sl@0: /** sl@0: @internalComponent sl@0: */ sl@0: TUint iTypeLength; sl@0: sl@0: /** sl@0: @internalComponent sl@0: */ sl@0: __TText iBuf[__Align(S)]; sl@0: }; sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Defines an empty or null literal descriptor. sl@0: sl@0: This is the build independent form. sl@0: An 8 bit build variant is generated for a non-Unicode build; sl@0: a 16 bit build variant is generated for a Unicode build. sl@0: */ sl@0: _LIT(KNullDesC,""); sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Defines an empty or null literal descriptor for use with 8-bit descriptors. sl@0: */ sl@0: _LIT8(KNullDesC8,""); sl@0: #ifndef __KERNEL_MODE__ sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Defines an empty or null literal descriptor for use with 16-bit descriptors sl@0: */ sl@0: _LIT16(KNullDesC16,""); sl@0: #endif sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Packages a non-modifiable pointer descriptor which represents an object of sl@0: specific type. sl@0: sl@0: The template parameter defines the type of object. sl@0: sl@0: The object represented by the packaged pointer descriptor is accessible through sl@0: the package but cannot be changed. */ sl@0: template sl@0: class TPckgC : public TPtrC8 sl@0: { sl@0: public: sl@0: inline TPckgC(const T& aRef); sl@0: inline const T& operator()() const; sl@0: private: sl@0: TPckgC& operator=(const TPckgC& aRef); sl@0: }; sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Packages a modifiable pointer descriptor which represents an object of specific sl@0: type. sl@0: sl@0: The template parameter defines the type of object. sl@0: sl@0: The object represented by the packaged pointer descriptor is accessible through sl@0: the package. sl@0: */ sl@0: template sl@0: class TPckg : public TPtr8 sl@0: { sl@0: public: sl@0: inline TPckg(const T& aRef); sl@0: inline T& operator()(); sl@0: private: sl@0: TPckg& operator=(const TPckg& aRef); sl@0: }; sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Packages an object into a modifiable buffer descriptor. sl@0: sl@0: The template parameter defines the type of object to be packaged. sl@0: sl@0: The package provides a type safe way of transferring an object or data structure sl@0: which is contained within a modifiable buffer descriptor. Typically, a package sl@0: is used for passing data via inter thread communication. sl@0: sl@0: The contained object is accessible through the package. sl@0: */ sl@0: template sl@0: class TPckgBuf : public TAlignedBuf8 sl@0: { sl@0: public: sl@0: inline TPckgBuf(); sl@0: inline TPckgBuf(const T& aRef); sl@0: inline TPckgBuf& operator=(const TPckgBuf& aRef); sl@0: inline T& operator=(const T& aRef); sl@0: inline T& operator()(); sl@0: inline const T& operator()() const; sl@0: }; sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Defines a modifiable buffer descriptor that can contain the name of a reference sl@0: counting object. sl@0: sl@0: @see TBuf sl@0: @see CObject sl@0: */ sl@0: typedef TBuf TName; sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Defines a modifiable buffer descriptor that can contain the full name of a sl@0: reference counting object. sl@0: sl@0: @see TBuf sl@0: @see CObject sl@0: */ sl@0: typedef TBuf TFullName; sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Defines a modifiable buffer descriptor to contain the category name identifying sl@0: the cause of thread or process termination. The buffer takes a maximum length sl@0: of KMaxExitCategoryName. sl@0: sl@0: @see RThread::ExitCategory sl@0: @see RThread::ExitCategory sl@0: */ sl@0: typedef TBuf TExitCategoryName; sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: A buffer that can contain the name of a file. sl@0: The name can have a maximum length of KMaxFileName sl@0: (currently 256 but check the definition of KMaxFileName). sl@0: sl@0: @see KMaxFileName sl@0: */ sl@0: typedef TBuf TFileName; sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: A buffer that can contain the name of a path. sl@0: The name can have a maximum length of KMaxPath sl@0: (currently 256 but check the definition of KMaxPath). sl@0: sl@0: @see KMaxPath sl@0: */ sl@0: typedef TBuf TPath; sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Version name type. sl@0: sl@0: This is a buffer descriptor with a maximum length of KMaxVersionName. sl@0: A TVersion object returns the formatted character representation of its version sl@0: information in a descriptor of this type. sl@0: sl@0: @see TVersion sl@0: */ sl@0: typedef TBuf TVersionName; sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Defines a modifiable buffer descriptor for the text form of the UID. sl@0: The descriptor has a maximum length of KMaxUidName and is used to contain sl@0: the standard text format returned by the function TUid::Name(). sl@0: sl@0: @see TUid::Name sl@0: */ sl@0: typedef TBuf TUidName; sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Defines a null UID sl@0: */ sl@0: #define KNullUid TUid::Null() sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: A globally unique 32-bit number. sl@0: */ sl@0: class TUid sl@0: { sl@0: public: sl@0: #ifndef __KERNEL_MODE__ sl@0: IMPORT_C TBool operator==(const TUid& aUid) const; sl@0: IMPORT_C TBool operator!=(const TUid& aUid) const; sl@0: IMPORT_C TUidName Name() const; sl@0: #endif sl@0: static inline TUid Uid(TInt aUid); sl@0: static inline TUid Null(); sl@0: public: sl@0: /** sl@0: The 32-bit integer UID value. sl@0: */ sl@0: TInt32 iUid; sl@0: }; sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Encapsulates a set of three unique identifiers (UIDs) which, in combination, sl@0: identify a system object such as a GUI application or a DLL. The three sl@0: component UIDs are referred to as UID1, UID2 and UID3. sl@0: sl@0: An object of this type is referred to as a compound identifier or a UID type. sl@0: */ sl@0: class TUidType sl@0: { sl@0: public: sl@0: #ifndef __KERNEL_MODE__ sl@0: IMPORT_C TUidType(); sl@0: IMPORT_C TUidType(TUid aUid1); sl@0: IMPORT_C TUidType(TUid aUid1,TUid aUid2); sl@0: IMPORT_C TUidType(TUid aUid1,TUid aUid2,TUid aUid3); sl@0: IMPORT_C TBool operator==(const TUidType& aUidType) const; sl@0: IMPORT_C TBool operator!=(const TUidType& aUidType) const; sl@0: IMPORT_C const TUid& operator[](TInt anIndex) const; sl@0: IMPORT_C TUid MostDerived() const; sl@0: IMPORT_C TBool IsPresent(TUid aUid) const; sl@0: IMPORT_C TBool IsValid() const; sl@0: private: sl@0: #endif sl@0: TUid iUid[KMaxCheckedUid]; sl@0: }; sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: A class used to represent the Secure ID of a process or executable image. sl@0: sl@0: Constructors and conversion operators are provided to enable conversion sl@0: of this class to and from both TUint32 and TUid objects. sl@0: sl@0: Because this class has non-default constructors, compilers will not initialise sl@0: this objects at compile time, instead code will be generated to construct the object sl@0: at run-time. This is wastefull, and Symbian OS DLLs are not permitted to have sl@0: such uninitialised data. To overcome these problems a macro is provided to construct sl@0: a const object which behaves like a TSecureId. This is _LIT_SECURE_ID. sl@0: This macro should be used where it is desirable to define const TSecureId objects, sl@0: like in header files. E.g. Instead of writing: sl@0: @code sl@0: const TSecureId MyId=0x1234567 sl@0: @endcode sl@0: use sl@0: @code sl@0: _LIT_SECURE_ID(MyId,0x1234567) sl@0: @endcode sl@0: sl@0: @publishedAll sl@0: @released sl@0: sl@0: @see _LIT_SECURE_ID sl@0: */ sl@0: class TSecureId sl@0: { sl@0: public: sl@0: inline TSecureId(); sl@0: inline TSecureId(TUint32 aId); sl@0: inline operator TUint32() const; sl@0: inline TSecureId(TUid aId); sl@0: inline operator TUid() const; sl@0: public: sl@0: TUint32 iId; sl@0: }; sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: A class used to represent the Vendor ID of a process or executable image sl@0: sl@0: Constructors and conversion operators are provided to enable conversion sl@0: of this class to and from both TUint32 and TUid objects. sl@0: sl@0: Because this class has non-default constructors, compilers will not initialise sl@0: this objects at compile time, instead code will be generated to construct the object sl@0: at run-time. This is wastefull, and Symbian OS DLLs are not permitted to have sl@0: such uninitialised data. To overcome these problems a macro is provided to construct sl@0: a const object which behaves like a TSecureId. This is _LIT_VENDOR_ID. sl@0: This macro should be used where it is desirable to define const TSecureId objects, sl@0: like in header files. E.g. Instead of writing: sl@0: @code sl@0: const TVendorId MyId=0x1234567 sl@0: @endcode sl@0: use sl@0: @code sl@0: _LIT_VENDOR_ID(MyId,0x1234567) sl@0: @endcode sl@0: sl@0: @publishedAll sl@0: @released sl@0: sl@0: @see _LIT_VENDOR_ID sl@0: */ sl@0: class TVendorId sl@0: { sl@0: public: sl@0: inline TVendorId(); sl@0: inline TVendorId(TUint32 aId); sl@0: inline operator TUint32() const; sl@0: inline TVendorId(TUid aId); sl@0: inline operator TUid() const; sl@0: public: sl@0: TUint32 iId; sl@0: }; sl@0: sl@0: sl@0: sl@0: /** sl@0: Structure for compile-time definition of a secure ID sl@0: @internalComponent sl@0: */ sl@0: class SSecureId sl@0: { sl@0: public: sl@0: inline const TSecureId* operator&() const; sl@0: inline operator const TSecureId&() const; sl@0: inline operator TUint32() const; sl@0: inline operator TUid() const; sl@0: public: sl@0: TUint32 iId; sl@0: }; sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: Structure for compile-time definition of a vendor ID sl@0: @internalComponent sl@0: */ sl@0: class SVendorId sl@0: { sl@0: public: sl@0: inline const TVendorId* operator&() const; sl@0: inline operator const TVendorId&() const; sl@0: inline operator TUint32() const; sl@0: inline operator TUid() const; sl@0: public: sl@0: TUint32 iId; sl@0: }; sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: Macro for compile-time definition of a secure ID sl@0: @param name Name to use for secure ID sl@0: @param value Value of secure ID sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #define _LIT_SECURE_ID(name,value) const SSecureId name={value} sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: Macro for compile-time definition of a vendor ID sl@0: @param name Name to use for vendor ID sl@0: @param value Value of vendor ID sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #define _LIT_VENDOR_ID(name,value) const SVendorId name={value} sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Contains version information. sl@0: sl@0: A version is defined by a set of three numbers: sl@0: sl@0: 1. the major version number, ranging from 0 to 127, inclusive sl@0: sl@0: 2. the minor version number, ranging from 0 to 99 inclusive sl@0: sl@0: 3. the build number, ranging from 0 to 32767 inclusive. sl@0: sl@0: The class provides a constructor for setting all three numbers. sl@0: It also provides a member function to build a character representation of sl@0: this information in a TVersionName descriptor. sl@0: sl@0: @see TVersionName sl@0: */ sl@0: class TVersion sl@0: { sl@0: public: sl@0: IMPORT_C TVersion(); sl@0: IMPORT_C TVersion(TInt aMajor,TInt aMinor,TInt aBuild); sl@0: IMPORT_C TVersionName Name() const; sl@0: public: sl@0: /** sl@0: The major version number. sl@0: */ sl@0: TInt8 iMajor; sl@0: sl@0: sl@0: /** sl@0: The minor version number. sl@0: */ sl@0: TInt8 iMinor; sl@0: sl@0: sl@0: /** sl@0: The build number. sl@0: */ sl@0: TInt16 iBuild; sl@0: }; sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Indicates the completion status of a request made to a service provider. sl@0: sl@0: When a thread makes a request, it passes a request status as a parameter. sl@0: On completion, the provider signals the requesting thread's request semaphore sl@0: and stores a completion code in the request status. Typically, this is KErrNone sl@0: or one of the other system-wide error codes. sl@0: sl@0: This class is not intended for user derivation. sl@0: */ sl@0: class TRequestStatus sl@0: { sl@0: public: sl@0: inline TRequestStatus(); sl@0: inline TRequestStatus(TInt aVal); sl@0: inline TInt operator=(TInt aVal); sl@0: inline TBool operator==(TInt aVal) const; sl@0: inline TBool operator!=(TInt aVal) const; sl@0: inline TBool operator>=(TInt aVal) const; sl@0: inline TBool operator<=(TInt aVal) const; sl@0: inline TBool operator>(TInt aVal) const; sl@0: inline TBool operator<(TInt aVal) const; sl@0: inline TInt Int() const; sl@0: private: sl@0: enum sl@0: { sl@0: EActive = 1, //bit0 sl@0: ERequestPending = 2, //bit1 sl@0: }; sl@0: TInt iStatus; sl@0: TUint iFlags; sl@0: friend class CActive; sl@0: friend class CActiveScheduler; sl@0: friend class CServer2; sl@0: //SL: Added this so that upon request completion a thread can set iStatus without touching iFlag sl@0: //That stuff is usually probably handled by some exec call accessing the memory directly (just a guess) sl@0: //@see RThread::RequestComplete sl@0: friend class RThread; sl@0: }; sl@0: sl@0: sl@0: sl@0: sl@0: class TSize; sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Stores a two-dimensional point in Cartesian co-ordinates. sl@0: sl@0: Its data members (iX and iY) are public and can be manipulated directly, or sl@0: by means of the functions provided. Functions are provided to set and manipulate sl@0: the point, and to compare points for equality. sl@0: */ sl@0: class TPoint sl@0: { sl@0: public: sl@0: #ifndef __KERNEL_MODE__ sl@0: enum TUninitialized { EUninitialized }; sl@0: /** sl@0: Constructs default point, initialising its iX and iY members to zero. sl@0: */ sl@0: TPoint(TUninitialized) {} sl@0: inline TPoint(); sl@0: inline TPoint(TInt aX,TInt aY); sl@0: IMPORT_C TBool operator==(const TPoint& aPoint) const; sl@0: IMPORT_C TBool operator!=(const TPoint& aPoint) const; sl@0: IMPORT_C TPoint& operator-=(const TPoint& aPoint); sl@0: IMPORT_C TPoint& operator+=(const TPoint& aPoint); sl@0: IMPORT_C TPoint& operator-=(const TSize& aSize); sl@0: IMPORT_C TPoint& operator+=(const TSize& aSize); sl@0: IMPORT_C TPoint operator-(const TPoint& aPoint) const; sl@0: IMPORT_C TPoint operator+(const TPoint& aPoint) const; sl@0: IMPORT_C TPoint operator-(const TSize& aSize) const; sl@0: IMPORT_C TPoint operator+(const TSize& aSize) const; sl@0: IMPORT_C TPoint operator-() const; sl@0: IMPORT_C void SetXY(TInt aX,TInt aY); sl@0: IMPORT_C TSize AsSize() const; sl@0: #endif sl@0: public: sl@0: /** sl@0: The x co-ordinate. sl@0: */ sl@0: TInt iX; sl@0: /** sl@0: The y co-ordinate. sl@0: */ sl@0: TInt iY; sl@0: }; sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @prototype sl@0: sl@0: Stores a three-dimensional point in Cartesian or polar co-ordinates. sl@0: Its data members (iX, iY and iZ) are public and can be manipulated directly. sl@0: sl@0: */ sl@0: class TPoint3D sl@0: { sl@0: public: sl@0: #ifndef __KERNEL_MODE__ sl@0: enum TUninitialized { EUninitialized }; sl@0: sl@0: /** sl@0: TUninitialized Constructor sl@0: */ sl@0: TPoint3D(TUninitialized) {} sl@0: /** sl@0: Constructs default TPoint3D, initialising its iX , iY and iZ members to zero. sl@0: */ sl@0: inline TPoint3D(); sl@0: /** sl@0: Constructs TPoint3D with the specified x,y and z co-ordinates. sl@0: */ sl@0: inline TPoint3D(TInt aX,TInt aY,TInt aZ); sl@0: /** sl@0: Copy Construct from TPoint , initialises Z co-ordinate to Zero sl@0: */ sl@0: inline TPoint3D(const TPoint& aPoint); sl@0: sl@0: IMPORT_C TBool operator==(const TPoint3D& aPoint3D) const; sl@0: IMPORT_C TBool operator!=(const TPoint3D& aPoint3D) const; sl@0: sl@0: IMPORT_C TPoint3D& operator-=(const TPoint3D& aPoint3D); sl@0: IMPORT_C TPoint3D& operator-=(const TPoint& aPoint); sl@0: sl@0: IMPORT_C TPoint3D& operator+=(const TPoint3D& aPoint3D); sl@0: IMPORT_C TPoint3D& operator+=(const TPoint& aPoint); sl@0: sl@0: IMPORT_C TPoint3D operator-(const TPoint3D& aPoint3D) const; sl@0: IMPORT_C TPoint3D operator-(const TPoint& aPoint) const; sl@0: sl@0: IMPORT_C TPoint3D operator+(const TPoint3D& aPoint3D) const; sl@0: IMPORT_C TPoint3D operator+(const TPoint& aPoint) const; sl@0: /** sl@0: Unary minus operator. The operator returns the negation of this Point3D sl@0: */ sl@0: IMPORT_C TPoint3D operator-() const; sl@0: sl@0: /** sl@0: Set Method to set the xyz co-ordinates of TPoint3D sl@0: */ sl@0: IMPORT_C void SetXYZ(TInt aX,TInt aY,TInt aZ); sl@0: sl@0: /** sl@0: TPoint3D from TPoint, sets the Z co-ordinate to Zero sl@0: */ sl@0: IMPORT_C void SetPoint(const TPoint& aPoint); sl@0: sl@0: /** sl@0: Returns TPoint from TPoint3D sl@0: */ sl@0: IMPORT_C TPoint AsPoint() const; sl@0: #endif sl@0: public: sl@0: /** sl@0: The x co-ordinate. sl@0: */ sl@0: TInt iX; sl@0: /** sl@0: The y co-ordinate. sl@0: */ sl@0: TInt iY; sl@0: /** sl@0: The z co-ordinate. sl@0: */ sl@0: TInt iZ; sl@0: }; sl@0: sl@0: sl@0: sl@0: /** sl@0: @internalTechnology sl@0: @prototype For now, only intended to be used by TRwEvent and the Windows Server sl@0: sl@0: Stores the angular spherical coordinates (Phi,Theta) of a three-dimensional point. sl@0: sl@0: Its data members (iPhi, iTheta) are public and can be manipulated directly. sl@0: */ sl@0: class TAngle3D sl@0: { sl@0: public: sl@0: /** sl@0: The Phi co-ordinate (angle between X-axis and the line that links the projection of the point on the X-Y plane and the origin). sl@0: */ sl@0: TInt iPhi; sl@0: /** sl@0: The Theta co-ordinate (angle between the Z-axis and the line that links the point and the origin). sl@0: */ sl@0: TInt iTheta; sl@0: }; sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Stores a two-dimensional size as a width and a height value. sl@0: sl@0: Its data members are public and can be manipulated directly, or by means of sl@0: the functions provided. sl@0: */ sl@0: class TSize sl@0: { sl@0: public: sl@0: #ifndef __KERNEL_MODE__ sl@0: enum TUninitialized { EUninitialized }; sl@0: /** sl@0: Constructs the size object with its iWidth and iHeight members set to zero. sl@0: */ sl@0: TSize(TUninitialized) {} sl@0: inline TSize(); sl@0: inline TSize(TInt aWidth,TInt aHeight); sl@0: IMPORT_C TBool operator==(const TSize& aSize) const; sl@0: IMPORT_C TBool operator!=(const TSize& aSize) const; sl@0: IMPORT_C TSize& operator-=(const TSize& aSize); sl@0: IMPORT_C TSize& operator-=(const TPoint& aPoint); sl@0: IMPORT_C TSize& operator+=(const TSize& aSize); sl@0: IMPORT_C TSize& operator+=(const TPoint& aPoint); sl@0: IMPORT_C TSize operator-(const TSize& aSize) const; sl@0: IMPORT_C TSize operator-(const TPoint& aPoint) const; sl@0: IMPORT_C TSize operator+(const TSize& aSize) const; sl@0: IMPORT_C TSize operator+(const TPoint& aPoint) const; sl@0: IMPORT_C TSize operator-() const; sl@0: IMPORT_C void SetSize(TInt aWidth,TInt aHeight); sl@0: IMPORT_C TPoint AsPoint() const; sl@0: #endif sl@0: public: sl@0: /** sl@0: The width of this TSize object. sl@0: */ sl@0: TInt iWidth; sl@0: /** sl@0: The height of this TSize object. sl@0: */ sl@0: TInt iHeight; sl@0: }; sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Information about a kernel object. sl@0: sl@0: This type of object is passed to RHandleBase::HandleInfo(). The function sl@0: fetches information on the usage of the kernel object associated with that sl@0: handle and stores the information in the THandleInfo object. sl@0: sl@0: The class contains four data members and no explicitly defined function sl@0: members. sl@0: */ sl@0: class THandleInfo sl@0: { sl@0: public: sl@0: /** sl@0: The number of times that the kernel object is open in the current process. sl@0: */ sl@0: TInt iNumOpenInProcess; sl@0: sl@0: /** sl@0: The number of times that the kernel object is open in the current thread. sl@0: */ sl@0: TInt iNumOpenInThread; sl@0: sl@0: /** sl@0: The number of processes which have a handle on the kernel object. sl@0: */ sl@0: TInt iNumProcesses; sl@0: sl@0: /** sl@0: The number of threads which have a handle on the kernel object. sl@0: */ sl@0: TInt iNumThreads; sl@0: }; sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @internalComponent sl@0: */ sl@0: class TFindHandle sl@0: { sl@0: public: sl@0: inline TFindHandle(); sl@0: inline TInt Handle() const; sl@0: #ifdef __KERNEL_MODE__ sl@0: inline TInt Index() const; sl@0: inline TInt UniqueID() const; sl@0: inline TUint64 ObjectID() const; sl@0: inline void Set(TInt aIndex, TInt aUniqueId, TUint64 aObjectId); sl@0: #else sl@0: protected: sl@0: inline void Reset(); sl@0: #endif sl@0: private: sl@0: TInt iHandle; sl@0: TInt iSpare1; sl@0: TInt iObjectIdLow; sl@0: TInt iObjectIdHigh; sl@0: }; sl@0: sl@0: sl@0: sl@0: class RThread; sl@0: class TFindHandleBase; sl@0: class TFindSemaphore; sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: A handle to an object. sl@0: sl@0: The class encapsulates the basic behaviour of a handle, hiding the sl@0: handle-number which identifies the object which the handle represents. sl@0: sl@0: The class is abstract in the sense that a RHandleBase object is never sl@0: explicitly instantiated. It is always a base class to a concrete handle class; sl@0: for example, RSemaphore, RThread, RProcess, RCriticalSection etc. sl@0: */ sl@0: class RHandleBase sl@0: { sl@0: public: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Read/Write attributes for the handle. sl@0: */ sl@0: enum TAttributes sl@0: { sl@0: EReadAccess=0x1, sl@0: EWriteAccess=0x2, sl@0: EDirectReadAccess=0x4, sl@0: EDirectWriteAccess=0x8, sl@0: }; sl@0: public: sl@0: inline RHandleBase(); sl@0: inline TInt Handle() const; sl@0: inline void SetHandle(TInt aHandle); sl@0: inline TInt SetReturnedHandle(TInt aHandleOrError); sl@0: static void DoExtendedClose(); sl@0: #ifndef __KERNEL_MODE__ sl@0: IMPORT_C void Close(); sl@0: IMPORT_C TName Name() const; sl@0: IMPORT_C TFullName FullName() const; sl@0: IMPORT_C void FullName(TDes& aName) const; sl@0: IMPORT_C void SetHandleNC(TInt aHandle); sl@0: IMPORT_C TInt Duplicate(const RThread& aSrc,TOwnerType aType=EOwnerProcess); sl@0: IMPORT_C void HandleInfo(THandleInfo* anInfo); sl@0: IMPORT_C TUint Attributes() const; sl@0: IMPORT_C TInt BTraceId() const; sl@0: IMPORT_C void NotifyDestruction(TRequestStatus& aStatus); /**< @internalTechnology */ sl@0: protected: sl@0: inline RHandleBase(TInt aHandle); sl@0: IMPORT_C TInt Open(const TFindHandleBase& aHandle,TOwnerType aType); sl@0: static TInt SetReturnedHandle(TInt aHandleOrError,RHandleBase& aHandle); sl@0: TInt OpenByName(const TDesC &aName,TOwnerType aOwnerType,TInt aObjectType); sl@0: #endif sl@0: private: sl@0: static void DoExtendedCloseL(); sl@0: protected: sl@0: TInt iHandle; sl@0: }; sl@0: sl@0: sl@0: sl@0: sl@0: class RMessagePtr2; sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: A handle to a semaphore. sl@0: sl@0: The semaphore itself is a Kernel side object. sl@0: sl@0: As with all handles, they should be closed after use. RHandleBase provides sl@0: the necessary Close() function, which should be called when the handle is sl@0: no longer required. sl@0: sl@0: @see RHandleBase::Close sl@0: */ sl@0: class RSemaphore : public RHandleBase sl@0: { sl@0: public: sl@0: #ifndef __KERNEL_MODE__ sl@0: inline TInt Open(const TFindSemaphore& aFind,TOwnerType aType=EOwnerProcess); sl@0: IMPORT_C TInt CreateLocal(TInt aCount,TOwnerType aType=EOwnerProcess); sl@0: IMPORT_C TInt CreateGlobal(const TDesC& aName,TInt aCount,TOwnerType aType=EOwnerProcess); sl@0: IMPORT_C TInt OpenGlobal(const TDesC& aName,TOwnerType aType=EOwnerProcess); sl@0: IMPORT_C TInt Open(RMessagePtr2 aMessage,TInt aParam,TOwnerType aType=EOwnerProcess); sl@0: IMPORT_C TInt Open(TInt aArgumentIndex, TOwnerType aType=EOwnerProcess); sl@0: IMPORT_C void Wait(); sl@0: IMPORT_C TInt Wait(TInt aTimeout); // timeout in microseconds sl@0: IMPORT_C void Signal(); sl@0: IMPORT_C void Signal(TInt aCount); sl@0: #endif sl@0: }; sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: A fast semaphore. sl@0: sl@0: This is a layer over a standard semaphore, and only calls into the kernel side sl@0: if there is contention. sl@0: */ sl@0: class RFastLock : public RSemaphore sl@0: { sl@0: public: sl@0: inline RFastLock(); sl@0: IMPORT_C TInt CreateLocal(TOwnerType aType=EOwnerProcess); sl@0: IMPORT_C void Wait(); sl@0: IMPORT_C void Signal(); sl@0: private: sl@0: TInt iCount; sl@0: }; sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: A read-write lock. sl@0: sl@0: This is a lock for co-ordinating readers and writers to shared resources. sl@0: It is designed to allow multiple concurrent readers. sl@0: It is not a kernel side object and so does not inherit from RHandleBase. sl@0: */ sl@0: class RReadWriteLock sl@0: { sl@0: public: sl@0: enum TReadWriteLockPriority sl@0: { sl@0: /** Pending writers always get the lock before pending readers */ sl@0: EWriterPriority, sl@0: /** Lock is given alternately to pending readers and writers */ sl@0: EAlternatePriority, sl@0: /** Pending readers always get the lock before pending writers - beware writer starvation! */ sl@0: EReaderPriority, sl@0: }; sl@0: enum TReadWriteLockClientCategoryLimit sl@0: { sl@0: /** Maximum number of clients in each category: read locked, read lock pending, write lock pending */ sl@0: EReadWriteLockClientCategoryLimit = KMaxTUint16 sl@0: }; sl@0: sl@0: public: sl@0: inline RReadWriteLock(); sl@0: IMPORT_C TInt CreateLocal(TReadWriteLockPriority aPriority = EWriterPriority); sl@0: IMPORT_C void Close(); sl@0: sl@0: IMPORT_C void ReadLock(); sl@0: IMPORT_C void WriteLock(); sl@0: IMPORT_C TBool TryReadLock(); sl@0: IMPORT_C TBool TryWriteLock(); sl@0: IMPORT_C TBool TryUpgradeReadLock(); sl@0: IMPORT_C void DowngradeWriteLock(); sl@0: IMPORT_C void Unlock(); sl@0: sl@0: private: sl@0: RReadWriteLock(const RReadWriteLock& aLock); sl@0: RReadWriteLock& operator=(const RReadWriteLock& aLock); sl@0: sl@0: TInt UnlockWriter(); sl@0: TInt UnlockAlternate(); sl@0: TInt UnlockReader(); sl@0: sl@0: private: sl@0: volatile TUint64 iValues; // Bits 0-15: readers; bit 16: writer; bits 32-47: readersPending; bits 48-63: writersPending sl@0: TReadWriteLockPriority iPriority; sl@0: RSemaphore iReaderSem; sl@0: RSemaphore iWriterSem; sl@0: TUint32 iSpare[4]; // Reserved for future development sl@0: }; sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: The user-side handle to a logical channel. sl@0: sl@0: The class provides functions that are used to open a channel sl@0: to a device driver, and to make requests. A device driver provides sl@0: a derived class to give the user-side a tailored interface to the driver. sl@0: */ sl@0: class RBusLogicalChannel : public RHandleBase sl@0: { sl@0: public: sl@0: IMPORT_C TInt Open(RMessagePtr2 aMessage,TInt aParam,TOwnerType aType=EOwnerProcess); sl@0: IMPORT_C TInt Open(TInt aArgumentIndex, TOwnerType aType=EOwnerProcess); sl@0: protected: sl@0: inline TInt DoCreate(const TDesC& aDevice, const TVersion& aVer, TInt aUnit, const TDesC* aDriver, const TDesC8* anInfo, TOwnerType aType=EOwnerProcess, TBool aProtected=EFalse); sl@0: IMPORT_C void DoCancel(TUint aReqMask); sl@0: IMPORT_C void DoRequest(TInt aReqNo,TRequestStatus& aStatus); sl@0: IMPORT_C void DoRequest(TInt aReqNo,TRequestStatus& aStatus,TAny* a1); sl@0: IMPORT_C void DoRequest(TInt aReqNo,TRequestStatus& aStatus,TAny* a1,TAny* a2); sl@0: IMPORT_C TInt DoControl(TInt aFunction); sl@0: IMPORT_C TInt DoControl(TInt aFunction,TAny* a1); sl@0: IMPORT_C TInt DoControl(TInt aFunction,TAny* a1,TAny* a2); sl@0: inline TInt DoSvControl(TInt aFunction) { return DoControl(aFunction); } sl@0: inline TInt DoSvControl(TInt aFunction,TAny* a1) { return DoControl(aFunction, a1); } sl@0: inline TInt DoSvControl(TInt aFunction,TAny* a1,TAny* a2) { return DoControl(aFunction, a1, a2); } sl@0: private: sl@0: IMPORT_C TInt DoCreate(const TDesC& aDevice, const TVersion& aVer, TInt aUnit, const TDesC* aDriver, const TDesC8* aInfo, TInt aType); sl@0: private: sl@0: // Padding for Binary Compatibility purposes sl@0: TInt iPadding1; sl@0: TInt iPadding2; sl@0: }; sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @internalComponent sl@0: sl@0: Base class for memory allocators. sl@0: */ sl@0: // Put pure virtual functions into a separate base class so that vptr is at same sl@0: // place in both GCC98r2 and EABI builds. sl@0: class MAllocator sl@0: { sl@0: public: sl@0: virtual TAny* Alloc(TInt aSize)=0; sl@0: virtual void Free(TAny* aPtr)=0; sl@0: virtual TAny* ReAlloc(TAny* aPtr, TInt aSize, TInt aMode=0)=0; sl@0: virtual TInt AllocLen(const TAny* aCell) const =0; sl@0: virtual TInt Compress()=0; sl@0: virtual void Reset()=0; sl@0: virtual TInt AllocSize(TInt& aTotalAllocSize) const =0; sl@0: virtual TInt Available(TInt& aBiggestBlock) const =0; sl@0: virtual TInt DebugFunction(TInt aFunc, TAny* a1=NULL, TAny* a2=NULL)=0; sl@0: virtual TInt Extension_(TUint aExtensionId, TAny*& a0, TAny* a1)=0; sl@0: }; sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Base class for heaps. sl@0: */ sl@0: class RAllocator : public MAllocator sl@0: { sl@0: public: sl@0: sl@0: sl@0: /** sl@0: A set of heap allocation failure flags. sl@0: sl@0: This enumeration indicates how to simulate heap allocation failure. sl@0: sl@0: @see RAllocator::__DbgSetAllocFail() sl@0: */ sl@0: enum TAllocFail { sl@0: /** sl@0: Attempts to allocate from this heap fail at a random rate; sl@0: however, the interval pattern between failures is the same sl@0: every time simulation is started. sl@0: */ sl@0: ERandom, sl@0: sl@0: sl@0: /** sl@0: Attempts to allocate from this heap fail at a random rate. sl@0: The interval pattern between failures may be different every sl@0: time the simulation is started. sl@0: */ sl@0: ETrueRandom, sl@0: sl@0: sl@0: /** sl@0: Attempts to allocate from this heap fail at a rate aRate; sl@0: for example, if aRate is 3, allocation fails at every sl@0: third attempt. sl@0: */ sl@0: EDeterministic, sl@0: sl@0: sl@0: /** sl@0: Cancels simulated heap allocation failure. sl@0: */ sl@0: ENone, sl@0: sl@0: sl@0: /** sl@0: An allocation from this heap will fail after the next aRate - 1 sl@0: allocation attempts. For example, if aRate = 1 then the next sl@0: attempt to allocate from this heap will fail. sl@0: */ sl@0: EFailNext, sl@0: sl@0: /** sl@0: Cancels simulated heap allocation failure, and sets sl@0: the nesting level for all allocated cells to zero. sl@0: */ sl@0: EReset, sl@0: sl@0: /** sl@0: aBurst allocations from this heap fail at a random rate; sl@0: however, the interval pattern between failures is the same sl@0: every time the simulation is started. sl@0: */ sl@0: EBurstRandom, sl@0: sl@0: sl@0: /** sl@0: aBurst allocations from this heap fail at a random rate. sl@0: The interval pattern between failures may be different every sl@0: time the simulation is started. sl@0: */ sl@0: EBurstTrueRandom, sl@0: sl@0: sl@0: /** sl@0: aBurst allocations from this heap fail at a rate aRate. sl@0: For example, if aRate is 10 and aBurst is 2, then 2 allocations sl@0: will fail at every tenth attempt. sl@0: */ sl@0: EBurstDeterministic, sl@0: sl@0: /** sl@0: aBurst allocations from this heap will fail after the next aRate - 1 sl@0: allocation attempts have occurred. For example, if aRate = 1 and sl@0: aBurst = 3 then the next 3 attempts to allocate from this heap will fail. sl@0: */ sl@0: EBurstFailNext, sl@0: sl@0: /** sl@0: Use this to determine how many times the current debug sl@0: failure mode has failed so far. sl@0: @see RAllocator::__DbgCheckFailure() sl@0: */ sl@0: ECheckFailure, sl@0: }; sl@0: sl@0: sl@0: /** sl@0: Heap debug checking type flag. sl@0: */ sl@0: enum TDbgHeapType { sl@0: /** sl@0: The heap is a user heap. sl@0: */ sl@0: EUser, sl@0: sl@0: /** sl@0: The heap is the Kernel heap. sl@0: */ sl@0: EKernel sl@0: }; sl@0: sl@0: sl@0: enum TAllocDebugOp {ECount, EMarkStart, EMarkEnd, ECheck, ESetFail, ECopyDebugInfo, ESetBurstFail}; sl@0: sl@0: sl@0: /** sl@0: Flags controlling reallocation. sl@0: */ sl@0: enum TReAllocMode { sl@0: /** sl@0: A reallocation of a cell must not change sl@0: the start address of the cell. sl@0: */ sl@0: ENeverMove=1, sl@0: sl@0: /** sl@0: Allows the start address of the cell to change sl@0: if the cell shrinks in size. sl@0: */ sl@0: EAllowMoveOnShrink=2 sl@0: }; sl@0: sl@0: sl@0: enum TFlags {ESingleThreaded=1, EFixedSize=2, ETraceAllocs=4, EMonitorMemory=8,}; sl@0: struct SCheckInfo {TBool iAll; TInt iCount; const TDesC8* iFileName; TInt iLineNum;}; sl@0: #ifndef SYMBIAN_ENABLE_SPLIT_HEADERS sl@0: struct SRAllocatorBurstFail {TInt iBurst; TInt iRate; TInt iUnused[2];}; sl@0: #endif sl@0: enum {EMaxHandles=32}; sl@0: sl@0: public: sl@0: inline RAllocator(); sl@0: #ifndef __KERNEL_MODE__ sl@0: IMPORT_C TInt Open(); sl@0: IMPORT_C void Close(); sl@0: IMPORT_C TAny* AllocZ(TInt aSize); sl@0: IMPORT_C TAny* AllocZL(TInt aSize); sl@0: IMPORT_C TAny* AllocL(TInt aSize); sl@0: IMPORT_C TAny* AllocLC(TInt aSize); sl@0: IMPORT_C void FreeZ(TAny*& aCell); sl@0: IMPORT_C TAny* ReAllocL(TAny* aCell, TInt aSize, TInt aMode=0); sl@0: IMPORT_C TInt Count() const; sl@0: IMPORT_C TInt Count(TInt& aFreeCount) const; sl@0: #endif sl@0: UIMPORT_C void Check() const; sl@0: UIMPORT_C void __DbgMarkStart(); sl@0: UIMPORT_C TUint32 __DbgMarkEnd(TInt aCount); sl@0: UIMPORT_C TInt __DbgMarkCheck(TBool aCountAll, TInt aCount, const TDesC8& aFileName, TInt aLineNum); sl@0: inline void __DbgMarkCheck(TBool aCountAll, TInt aCount, const TUint8* aFileName, TInt aLineNum); sl@0: UIMPORT_C void __DbgSetAllocFail(TAllocFail aType, TInt aRate); sl@0: UIMPORT_C void __DbgSetBurstAllocFail(TAllocFail aType, TUint aRate, TUint aBurst); sl@0: UIMPORT_C TUint __DbgCheckFailure(); sl@0: protected: sl@0: UIMPORT_C virtual TInt Extension_(TUint aExtensionId, TAny*& a0, TAny* a1); sl@0: #ifndef __KERNEL_MODE__ sl@0: IMPORT_C virtual void DoClose(); sl@0: #endif sl@0: protected: sl@0: TInt iAccessCount; sl@0: TInt iHandleCount; sl@0: TInt* iHandles; sl@0: TUint32 iFlags; sl@0: TInt iCellCount; sl@0: TInt iTotalAllocSize; sl@0: }; sl@0: sl@0: sl@0: sl@0: sl@0: class UserHeap; sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Represents the default implementation for a heap. sl@0: sl@0: The default implementation uses an address-ordered first fit type algorithm. sl@0: sl@0: The heap itself is contained in a chunk and may be the only occupant of the sl@0: chunk or may share the chunk with the program stack. sl@0: sl@0: The class contains member functions for allocating, adjusting, freeing individual sl@0: cells and generally managing the heap. sl@0: sl@0: The class is not a handle in the same sense that RChunk is a handle; i.e. sl@0: there is no Kernel object which corresponds to the heap. sl@0: */ sl@0: class RHeap : public RAllocator sl@0: { sl@0: public: sl@0: /** sl@0: The structure of a heap cell header for a heap cell on the free list. sl@0: */ sl@0: struct SCell { sl@0: /** sl@0: The length of the cell, which includes the length of sl@0: this header. sl@0: */ sl@0: TInt len; sl@0: sl@0: sl@0: /** sl@0: A pointer to the next cell in the free list. sl@0: */ sl@0: SCell* next; sl@0: }; sl@0: sl@0: sl@0: /** sl@0: The structure of a heap cell header for an allocated heap cell in a debug build. sl@0: */ sl@0: struct SDebugCell { sl@0: /** sl@0: The length of the cell, which includes the length of sl@0: this header. sl@0: */ sl@0: TInt len; sl@0: sl@0: sl@0: /** sl@0: The nested level. sl@0: */ sl@0: TInt nestingLevel; sl@0: sl@0: sl@0: /** sl@0: The cumulative number of allocated cells sl@0: */ sl@0: TInt allocCount; sl@0: }; sl@0: sl@0: /** sl@0: @internalComponent sl@0: */ sl@0: struct SHeapCellInfo { RHeap* iHeap; TInt iTotalAlloc; TInt iTotalAllocSize; TInt iTotalFree; TInt iLevelAlloc; SDebugCell* iStranded; }; sl@0: sl@0: /** sl@0: @internalComponent sl@0: */ sl@0: struct _s_align {char c; double d;}; sl@0: sl@0: /** sl@0: The default cell alignment. sl@0: */ sl@0: enum {ECellAlignment = sizeof(_s_align)-sizeof(double)}; sl@0: sl@0: /** sl@0: Size of a free cell header. sl@0: */ sl@0: enum {EFreeCellSize = sizeof(SCell)}; sl@0: sl@0: sl@0: #ifdef _DEBUG sl@0: /** sl@0: Size of an allocated cell header in a debug build. sl@0: */ sl@0: enum {EAllocCellSize = sizeof(SDebugCell)}; sl@0: #else sl@0: /** sl@0: Size of an allocated cell header in a release build. sl@0: */ sl@0: enum {EAllocCellSize = sizeof(SCell*)}; sl@0: #endif sl@0: sl@0: sl@0: /** sl@0: @internalComponent sl@0: */ sl@0: enum TDebugOp {EWalk=128}; sl@0: sl@0: sl@0: /** sl@0: @internalComponent sl@0: */ sl@0: enum TCellType sl@0: {EGoodAllocatedCell, EGoodFreeCell, EBadAllocatedCellSize, EBadAllocatedCellAddress, sl@0: EBadFreeCellAddress, EBadFreeCellSize}; sl@0: sl@0: sl@0: /** sl@0: @internalComponent sl@0: */ sl@0: enum TDebugHeapId {EUser=0, EKernel=1}; sl@0: sl@0: /** sl@0: @internalComponent sl@0: */ sl@0: enum TDefaultShrinkRatios {EShrinkRatio1=256, EShrinkRatioDflt=512}; sl@0: sl@0: #ifndef SYMBIAN_ENABLE_SPLIT_HEADERS sl@0: /** sl@0: @internalComponent sl@0: */ sl@0: #else sl@0: private: sl@0: #endif sl@0: typedef void (*TWalkFunc)(TAny*, TCellType, TAny*, TInt); sl@0: sl@0: public: sl@0: UIMPORT_C virtual TAny* Alloc(TInt aSize); sl@0: UIMPORT_C virtual void Free(TAny* aPtr); sl@0: UIMPORT_C virtual TAny* ReAlloc(TAny* aPtr, TInt aSize, TInt aMode=0); sl@0: UIMPORT_C virtual TInt AllocLen(const TAny* aCell) const; sl@0: #ifndef __KERNEL_MODE__ sl@0: UIMPORT_C virtual TInt Compress(); sl@0: UIMPORT_C virtual void Reset(); sl@0: UIMPORT_C virtual TInt AllocSize(TInt& aTotalAllocSize) const; sl@0: UIMPORT_C virtual TInt Available(TInt& aBiggestBlock) const; sl@0: #endif sl@0: UIMPORT_C virtual TInt DebugFunction(TInt aFunc, TAny* a1=NULL, TAny* a2=NULL); sl@0: protected: sl@0: UIMPORT_C virtual TInt Extension_(TUint aExtensionId, TAny*& a0, TAny* a1); sl@0: public: sl@0: UIMPORT_C RHeap(TInt aMaxLength, TInt aAlign=0, TBool aSingleThread=ETrue); sl@0: UIMPORT_C RHeap(TInt aChunkHandle, TInt aOffset, TInt aMinLength, TInt aMaxLength, TInt aGrowBy, TInt aAlign=0, TBool aSingleThread=EFalse); sl@0: UIMPORT_C TAny* operator new(TUint aSize, TAny* aBase) __NO_THROW; sl@0: inline void operator delete(TAny* aPtr, TAny* aBase); sl@0: inline TUint8* Base() const; sl@0: inline TInt Size() const; sl@0: inline TInt MaxLength() const; sl@0: inline TInt Align(TInt a) const; sl@0: inline const TAny* Align(const TAny* a) const; sl@0: inline TBool IsLastCell(const SCell* aCell) const; sl@0: inline void Lock() const; sl@0: inline void Unlock() const; sl@0: inline TInt ChunkHandle() const; sl@0: protected: sl@0: inline RHeap(); sl@0: void Initialise(); sl@0: SCell* DoAlloc(TInt aSize, SCell*& aLastFree); sl@0: void DoFree(SCell* pC); sl@0: TInt TryToGrowHeap(TInt aSize, SCell* aLastFree); sl@0: inline void FindFollowingFreeCell(SCell* aCell, SCell*& pPrev, SCell*& aNext); sl@0: TInt TryToGrowCell(SCell* pC, SCell* pP, SCell* pE, TInt aSize); sl@0: TInt Reduce(SCell* aCell); sl@0: UIMPORT_C SCell* GetAddress(const TAny* aCell) const; sl@0: void CheckCell(const SCell* aCell) const; sl@0: void Walk(TWalkFunc aFunc, TAny* aPtr); sl@0: static void WalkCheckCell(TAny* aPtr, TCellType aType, TAny* aCell, TInt aLen); sl@0: TInt DoCountAllocFree(TInt& aFree); sl@0: TInt DoCheckHeap(SCheckInfo* aInfo); sl@0: void DoMarkStart(); sl@0: TUint32 DoMarkEnd(TInt aExpected); sl@0: void DoSetAllocFail(TAllocFail aType, TInt aRate); sl@0: TBool CheckForSimulatedAllocFail(); sl@0: inline TInt SetBrk(TInt aBrk); sl@0: inline TAny* ReAllocImpl(TAny* aPtr, TInt aSize, TInt aMode); sl@0: void DoSetAllocFail(TAllocFail aType, TInt aRate, TUint aBurst); sl@0: protected: sl@0: TInt iMinLength; sl@0: TInt iMaxLength; sl@0: TInt iOffset; sl@0: TInt iGrowBy; sl@0: TInt iChunkHandle; sl@0: RFastLock iLock; sl@0: TUint8* iBase; sl@0: TUint8* iTop; sl@0: TInt iAlign; sl@0: TInt iMinCell; sl@0: TInt iPageSize; sl@0: SCell iFree; sl@0: protected: sl@0: TInt iNestingLevel; sl@0: TInt iAllocCount; sl@0: TAllocFail iFailType; sl@0: TInt iFailRate; sl@0: TBool iFailed; sl@0: TInt iFailAllocCount; sl@0: TInt iRand; sl@0: TAny* iTestData; sl@0: sl@0: friend class UserHeap; sl@0: }; sl@0: sl@0: sl@0: sl@0: sl@0: sl@0: class OnlyCreateWithNull; sl@0: sl@0: /** @internalTechnology */ sl@0: typedef void (OnlyCreateWithNull::* __NullPMF)(); sl@0: sl@0: /** @internalTechnology */ sl@0: class OnlyCreateWithNull sl@0: { sl@0: public: sl@0: inline OnlyCreateWithNull(__NullPMF /*aPointerToNull*/) {} sl@0: }; sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: A handle to a message sent by the client to the server. sl@0: sl@0: A server's interaction with its clients is channelled through an RMessagePtr2 sl@0: object, which acts as a handle to a message sent by the client. sl@0: The details of the original message are kept by the kernel allowing it enforce sl@0: correct usage of the member functions of this class. sl@0: sl@0: @see RMessage2 sl@0: */ sl@0: class RMessagePtr2 sl@0: { sl@0: public: sl@0: inline RMessagePtr2(); sl@0: inline TBool IsNull() const; sl@0: inline TInt Handle() const; sl@0: #ifndef __KERNEL_MODE__ sl@0: IMPORT_C void Complete(TInt aReason) const; sl@0: IMPORT_C void Complete(RHandleBase aHandle) const; sl@0: IMPORT_C TInt GetDesLength(TInt aParam) const; sl@0: IMPORT_C TInt GetDesLengthL(TInt aParam) const; sl@0: IMPORT_C TInt GetDesMaxLength(TInt aParam) const; sl@0: IMPORT_C TInt GetDesMaxLengthL(TInt aParam) const; sl@0: IMPORT_C void ReadL(TInt aParam,TDes8& aDes,TInt aOffset=0) const; sl@0: IMPORT_C void ReadL(TInt aParam,TDes16 &aDes,TInt aOffset=0) const; sl@0: IMPORT_C void WriteL(TInt aParam,const TDesC8& aDes,TInt aOffset=0) const; sl@0: IMPORT_C void WriteL(TInt aParam,const TDesC16& aDes,TInt aOffset=0) const; sl@0: IMPORT_C TInt Read(TInt aParam,TDes8& aDes,TInt aOffset=0) const; sl@0: IMPORT_C TInt Read(TInt aParam,TDes16 &aDes,TInt aOffset=0) const; sl@0: IMPORT_C TInt Write(TInt aParam,const TDesC8& aDes,TInt aOffset=0) const; sl@0: IMPORT_C TInt Write(TInt aParam,const TDesC16& aDes,TInt aOffset=0) const; sl@0: IMPORT_C void Panic(const TDesC& aCategory,TInt aReason) const; sl@0: IMPORT_C void Kill(TInt aReason) const; sl@0: IMPORT_C void Terminate(TInt aReason) const; sl@0: IMPORT_C TInt SetProcessPriority(TProcessPriority aPriority) const; sl@0: inline void SetProcessPriorityL(TProcessPriority aPriority) const; sl@0: IMPORT_C TInt Client(RThread& aClient, TOwnerType aOwnerType=EOwnerProcess) const; sl@0: inline void ClientL(RThread& aClient, TOwnerType aOwnerType=EOwnerProcess) const; sl@0: IMPORT_C TUint ClientProcessFlags() const; sl@0: IMPORT_C const TRequestStatus* ClientStatus() const; sl@0: IMPORT_C TBool ClientIsRealtime() const; sl@0: sl@0: /** sl@0: Return the Secure ID of the process which sent this message. sl@0: sl@0: If an intended use of this method is to check that the Secure ID is sl@0: a given value, then the use of a TSecurityPolicy object should be sl@0: considered. E.g. Instead of something like: sl@0: sl@0: @code sl@0: RMessagePtr2& message; sl@0: TInt error = message.SecureId()==KRequiredSecureId ? KErrNone : KErrPermissionDenied; sl@0: @endcode sl@0: sl@0: this could be used; sl@0: sl@0: @code sl@0: RMessagePtr2& message; sl@0: static _LIT_SECURITY_POLICY_S0(mySidPolicy, KRequiredSecureId); sl@0: TBool pass = mySidPolicy().CheckPolicy(message); sl@0: @endcode sl@0: sl@0: This has the benefit that the TSecurityPolicy::CheckPolicy methods are sl@0: configured by the system wide Platform Security configuration. I.e. are sl@0: capable of emitting diagnostic messages when a check fails and/or the sl@0: check can be forced to always pass. sl@0: sl@0: @see TSecurityPolicy::CheckPolicy(RMessagePtr2 aMsgPtr, const char* aDiagnostic) const sl@0: @see _LIT_SECURITY_POLICY_S0 sl@0: sl@0: @return The Secure ID. sl@0: sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: IMPORT_C TSecureId SecureId() const; sl@0: sl@0: /** sl@0: Return the Vendor ID of the process which sent this message. sl@0: sl@0: If an intended use of this method is to check that the Vendor ID is sl@0: a given value, then the use of a TSecurityPolicy object should be sl@0: considered. E.g. Instead of something like: sl@0: sl@0: @code sl@0: RMessagePtr2& message; sl@0: TInt error = message.VendorId()==KRequiredVendorId ? KErrNone : KErrPermissionDenied; sl@0: @endcode sl@0: sl@0: this could be used; sl@0: sl@0: @code sl@0: RMessagePtr2& message; sl@0: static _LIT_SECURITY_POLICY_V0(myVidPolicy, KRequiredVendorId); sl@0: TBool pass = myVidPolicy().CheckPolicy(message); sl@0: @endcode sl@0: sl@0: This has the benefit that the TSecurityPolicy::CheckPolicy methods are sl@0: configured by the system wide Platform Security configuration. I.e. are sl@0: capable of emitting diagnostic messages when a check fails and/or the sl@0: check can be forced to always pass. sl@0: sl@0: @see TSecurityPolicy::CheckPolicy(RMessagePtr2 aMsgPtr, const char* aDiagnostic) const sl@0: @see _LIT_SECURITY_POLICY_V0 sl@0: sl@0: @return The Vendor ID. sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: IMPORT_C TVendorId VendorId() const; sl@0: sl@0: /** sl@0: Check if the process which sent this message has a given capability. sl@0: sl@0: When a check fails the action taken is determined by the system wide Platform Security sl@0: configuration. If PlatSecDiagnostics is ON, then a diagnostic message is emitted. sl@0: If PlatSecEnforcement is OFF, then this function will return ETrue even though the sl@0: check failed. sl@0: sl@0: @param aCapability The capability to test. sl@0: @param aDiagnostic A string that will be emitted along with any diagnostic message sl@0: that may be issued if the test finds the capability is not present. sl@0: This string must be enclosed in the __PLATSEC_DIAGNOSTIC_STRING macro sl@0: which enables it to be easily removed from the system. sl@0: @return ETrue if process which sent this message has the capability, EFalse otherwise. sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #ifndef __REMOVE_PLATSEC_DIAGNOSTIC_STRINGS__ sl@0: inline TBool HasCapability(TCapability aCapability, const char* aDiagnostic=0) const; sl@0: #else //__REMOVE_PLATSEC_DIAGNOSTIC_STRINGS__ sl@0: // Only available to NULL arguments sl@0: inline TBool HasCapability(TCapability aCapability, OnlyCreateWithNull aDiagnostic=NULL) const; sl@0: #ifndef __REMOVE_PLATSEC_DIAGNOSTICS__ sl@0: // For things using KSuppressPlatSecDiagnostic sl@0: inline TBool HasCapability(TCapability aCapability, OnlyCreateWithNull aDiagnostic, OnlyCreateWithNull aSuppress) const; sl@0: #endif // !__REMOVE_PLATSEC_DIAGNOSTICS__ sl@0: #endif // !__REMOVE_PLATSEC_DIAGNOSTIC_STRINGS__ sl@0: sl@0: /** sl@0: Check if the process which sent this message has a given capability. sl@0: sl@0: When a check fails the action taken is determined by the system wide Platform Security sl@0: configuration. If PlatSecDiagnostics is ON, then a diagnostic message is emitted. sl@0: If PlatSecEnforcement is OFF, then this function will not leave even though the sl@0: check failed. sl@0: sl@0: @param aCapability The capability to test. sl@0: @param aDiagnosticMessage A string that will be emitted along with any diagnostic message sl@0: that may be issued if the test finds the capability is not present. sl@0: This string must be enclosed in the __PLATSEC_DIAGNOSTIC_STRING macro sl@0: which enables it to be easily removed from the system. sl@0: @leave KErrPermissionDenied, if the process does not have the capability. sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #ifndef __REMOVE_PLATSEC_DIAGNOSTIC_STRINGS__ sl@0: inline void HasCapabilityL(TCapability aCapability, const char* aDiagnosticMessage=0) const; sl@0: #else //__REMOVE_PLATSEC_DIAGNOSTIC_STRINGS__ sl@0: // Only available to NULL arguments sl@0: inline void HasCapabilityL(TCapability aCapability, OnlyCreateWithNull aDiagnosticMessage=NULL) const; sl@0: #ifndef __REMOVE_PLATSEC_DIAGNOSTICS__ sl@0: // For things using KSuppressPlatSecDiagnostic sl@0: inline void HasCapabilityL(TCapability aCapability, OnlyCreateWithNull aDiagnostic, OnlyCreateWithNull aSuppress) const; sl@0: #endif // !__REMOVE_PLATSEC_DIAGNOSTICS__ sl@0: #endif // !__REMOVE_PLATSEC_DIAGNOSTIC_STRINGS__ sl@0: sl@0: /** sl@0: Check if the process which sent this message has both of the given capabilities. sl@0: sl@0: When a check fails the action taken is determined by the system wide Platform Security sl@0: configuration. If PlatSecDiagnostics is ON, then a diagnostic message is emitted. sl@0: If PlatSecEnforcement is OFF, then this function will return ETrue even though the sl@0: check failed. sl@0: sl@0: @param aCapability1 The first capability to test. sl@0: @param aCapability2 The second capability to test. sl@0: @param aDiagnostic A string that will be emitted along with any diagnostic message sl@0: that may be issued if the test finds a capability is not present. sl@0: This string should be enclosed in the __PLATSEC_DIAGNOSTIC_STRING macro sl@0: which enables it to be easily removed from the system. sl@0: @return ETrue if the process which sent this message has both the capabilities, EFalse otherwise. sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #ifndef __REMOVE_PLATSEC_DIAGNOSTIC_STRINGS__ sl@0: inline TBool HasCapability(TCapability aCapability1, TCapability aCapability2, const char* aDiagnostic=0) const; sl@0: #else //__REMOVE_PLATSEC_DIAGNOSTIC_STRINGS__ sl@0: // Only available to NULL arguments sl@0: inline TBool HasCapability(TCapability aCapability1, TCapability aCapability2, OnlyCreateWithNull aDiagnostic=NULL) const; sl@0: #ifndef __REMOVE_PLATSEC_DIAGNOSTICS__ sl@0: // For things using KSuppressPlatSecDiagnostic sl@0: inline TBool HasCapability(TCapability aCapability1, TCapability aCapability2, OnlyCreateWithNull aDiagnostic, OnlyCreateWithNull aSuppress) const; sl@0: #endif // !__REMOVE_PLATSEC_DIAGNOSTICS__ sl@0: #endif // !__REMOVE_PLATSEC_DIAGNOSTIC_STRINGS__ sl@0: sl@0: /** sl@0: Check if the process which sent this message has both of the given capabilities. sl@0: sl@0: When a check fails the action taken is determined by the system wide Platform Security sl@0: configuration. If PlatSecDiagnostics is ON, then a diagnostic message is emitted. sl@0: If PlatSecEnforcement is OFF, then this function will not leave even though the sl@0: check failed. sl@0: sl@0: @param aCapability1 The first capability to test. sl@0: @param aCapability2 The second capability to test. sl@0: @param aDiagnosticMessage A string that will be emitted along with any diagnostic message sl@0: that may be issued if the test finds a capability is not present. sl@0: This string should be enclosed in the __PLATSEC_DIAGNOSTIC_STRING macro sl@0: which enables it to be easily removed from the system. sl@0: @leave KErrPermissionDenied, if the process does not have the capabilities. sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #ifndef __REMOVE_PLATSEC_DIAGNOSTIC_STRINGS__ sl@0: inline void HasCapabilityL(TCapability aCapability1, TCapability aCapability2, const char* aDiagnosticMessage=0) const; sl@0: #else //__REMOVE_PLATSEC_DIAGNOSTIC_STRINGS__ sl@0: // Only available to NULL arguments sl@0: inline void HasCapabilityL(TCapability aCapability1, TCapability aCapability2, OnlyCreateWithNull aDiagnosticMessage=NULL) const; sl@0: #ifndef __REMOVE_PLATSEC_DIAGNOSTICS__ sl@0: // For things using KSuppressPlatSecDiagnostic sl@0: inline void HasCapabilityL(TCapability aCapability1, TCapability aCapability2, OnlyCreateWithNull aDiagnostic, OnlyCreateWithNull aSuppress) const; sl@0: #endif // !__REMOVE_PLATSEC_DIAGNOSTICS__ sl@0: #endif // !__REMOVE_PLATSEC_DIAGNOSTIC_STRINGS__ sl@0: sl@0: /** sl@0: @deprecated Use SecureId() sl@0: */ sl@0: inline TUid Identity() const { return SecureId(); } sl@0: #endif sl@0: sl@0: private: sl@0: // Implementations of functions with diagnostics sl@0: IMPORT_C TBool DoHasCapability(TCapability aCapability, const char* aDiagnostic) const; sl@0: IMPORT_C TBool DoHasCapability(TCapability aCapability) const; sl@0: IMPORT_C TBool DoHasCapability(TCapability aCapability, TCapability aCapability2, const char* aDiagnostic) const; sl@0: IMPORT_C TBool DoHasCapability(TCapability aCapability, TCapability aCapability2) const; sl@0: sl@0: protected: sl@0: TInt iHandle; sl@0: }; sl@0: inline TBool operator==(RMessagePtr2 aLeft,RMessagePtr2 aRight); sl@0: inline TBool operator!=(RMessagePtr2 aLeft,RMessagePtr2 aRight); sl@0: sl@0: class CSession2; sl@0: sl@0: #define __IPC_V2_PRESENT__ sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: An object that encapsulates the details of a client request. sl@0: */ sl@0: class RMessage2 : public RMessagePtr2 sl@0: { sl@0: friend class CServer2; sl@0: public: sl@0: sl@0: /** sl@0: Defines internal message types. sl@0: */ sl@0: enum TSessionMessages { sl@0: /** sl@0: A message type used internally that means connect. sl@0: */ sl@0: EConnect=-1, sl@0: sl@0: /** sl@0: A message type used internally that means disconnect. sl@0: */ sl@0: EDisConnect=-2 sl@0: }; sl@0: public: sl@0: inline RMessage2(); sl@0: #ifndef __KERNEL_MODE__ sl@0: IMPORT_C explicit RMessage2(const RMessagePtr2& aPtr); sl@0: void SetAuthorised() const; sl@0: void ClearAuthorised() const; sl@0: TBool Authorised() const; sl@0: #endif sl@0: inline TInt Function() const; sl@0: inline TInt Int0() const; sl@0: inline TInt Int1() const; sl@0: inline TInt Int2() const; sl@0: inline TInt Int3() const; sl@0: inline const TAny* Ptr0() const; sl@0: inline const TAny* Ptr1() const; sl@0: inline const TAny* Ptr2() const; sl@0: inline const TAny* Ptr3() const; sl@0: inline CSession2* Session() const; sl@0: protected: sl@0: sl@0: /** sl@0: The request type. sl@0: */ sl@0: TInt iFunction; sl@0: sl@0: /** sl@0: A copy of the message arguments. sl@0: */ sl@0: TInt iArgs[KMaxMessageArguments]; sl@0: private: sl@0: TInt iSpare1; sl@0: protected: sl@0: /** sl@0: @internalComponent sl@0: */ sl@0: const TAny* iSessionPtr; sl@0: private: sl@0: mutable TInt iFlags;// Currently only used for *Authorised above sl@0: TInt iSpare3; // Reserved for future use sl@0: sl@0: friend class RMessage; sl@0: }; sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Defines an 8-bit modifiable buffer descriptor to contain passwords when dealing sl@0: with password security support in a file server session. sl@0: sl@0: The descriptor takes a maximum length of KMaxMediaPassword. sl@0: sl@0: @see KMaxMediaPassword sl@0: */ sl@0: typedef TBuf8 TMediaPassword; // 128 bit sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedPartner sl@0: @prototype sl@0: A configuration flag for the shared chunk buffer configuration class (used by the multimedia device drivers). This being sl@0: set signifies that a buffer offset list follows the buffer configuration class. This list holds the offset of each buffer. sl@0: */ sl@0: const TUint KScFlagBufOffsetListInUse=0x00000001; sl@0: sl@0: /** sl@0: @publishedPartner sl@0: @prototype sl@0: A configuration flag for the shared chunk buffer configuration class (used by the multimedia device drivers). This being sl@0: set is a suggestion that the shared chunk should be configured leaving guard pages around each buffers. sl@0: */ sl@0: const TUint KScFlagUseGuardPages=0x00000002; sl@0: sl@0: /** sl@0: @publishedPartner sl@0: @prototype sl@0: The shared chunk buffer configuration class (used by the multimedia device drivers). This is used to hold information sl@0: on the current buffer configuration within a shared chunk. sl@0: */ sl@0: class TSharedChunkBufConfigBase sl@0: { sl@0: public: sl@0: inline TSharedChunkBufConfigBase(); sl@0: public: sl@0: /** The number of buffers. */ sl@0: TInt iNumBuffers; sl@0: /** The size of each buffer in bytes. */ sl@0: TInt iBufferSizeInBytes; sl@0: /** Reserved field. */ sl@0: TInt iReserved1; sl@0: /** Shared chunk buffer flag settings. */ sl@0: TUint iFlags; sl@0: }; sl@0: sl@0: sl@0: /** Maximum size of capability set sl@0: sl@0: @internalTechnology sl@0: */ sl@0: const TInt KCapabilitySetMaxSize = (((TInt)ECapability_HardLimit + 7)>>3); sl@0: sl@0: /** Maximum size of any future extension to TSecurityPolicy sl@0: sl@0: @internalTechnology sl@0: */ sl@0: const TInt KMaxSecurityPolicySize = KCapabilitySetMaxSize + 3*sizeof(TUint32); sl@0: sl@0: sl@0: /** Class representing an arbitrary set of capabilities. sl@0: sl@0: This class can only contain capabilities supported by the current OS version. sl@0: sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: class TCapabilitySet sl@0: { sl@0: public: sl@0: inline TCapabilitySet(); sl@0: inline TCapabilitySet(TCapability aCapability); sl@0: IMPORT_C TCapabilitySet(TCapability aCapability1, TCapability aCapability2); sl@0: IMPORT_C void SetEmpty(); sl@0: inline void Set(TCapability aCapability); sl@0: inline void Set(TCapability aCapability1, TCapability aCapability2); sl@0: IMPORT_C void SetAllSupported(); sl@0: IMPORT_C void AddCapability(TCapability aCapability); sl@0: IMPORT_C void RemoveCapability(TCapability aCapability); sl@0: IMPORT_C void Union(const TCapabilitySet& aCapabilities); sl@0: IMPORT_C void Intersection(const TCapabilitySet& aCapabilities); sl@0: IMPORT_C void Remove(const TCapabilitySet& aCapabilities); sl@0: IMPORT_C TBool HasCapability(TCapability aCapability) const; sl@0: IMPORT_C TBool HasCapabilities(const TCapabilitySet& aCapabilities) const; sl@0: sl@0: /** sl@0: Make this set consist of the capabilities which are disabled on this platform. sl@0: @internalTechnology sl@0: */ sl@0: IMPORT_C void SetDisabled(); sl@0: /** sl@0: @internalComponent sl@0: */ sl@0: TBool NotEmpty() const; sl@0: sl@0: private: sl@0: TUint32 iCaps[KCapabilitySetMaxSize / sizeof(TUint32)]; sl@0: }; sl@0: sl@0: #ifndef __SECURITY_INFO_DEFINED__ sl@0: #define __SECURITY_INFO_DEFINED__ sl@0: /** sl@0: @internalTechnology sl@0: */ sl@0: struct SCapabilitySet sl@0: { sl@0: enum {ENCapW=2}; sl@0: sl@0: inline void AddCapability(TCapability aCap1) {((TCapabilitySet*)this)->AddCapability(aCap1);} sl@0: inline void Remove(const SCapabilitySet& aCaps) {((TCapabilitySet*)this)->Remove(*((TCapabilitySet*)&aCaps));} sl@0: inline TBool NotEmpty() const {return ((TCapabilitySet*)this)->NotEmpty();} sl@0: sl@0: inline const TUint32& operator[] (TInt aIndex) const { return iCaps[aIndex]; } sl@0: inline TUint32& operator[] (TInt aIndex) { return iCaps[aIndex]; } sl@0: sl@0: TUint32 iCaps[ENCapW]; sl@0: }; sl@0: sl@0: /** sl@0: @internalTechnology sl@0: */ sl@0: struct SSecurityInfo sl@0: { sl@0: TUint32 iSecureId; sl@0: TUint32 iVendorId; sl@0: SCapabilitySet iCaps; // Capabilities re. platform security sl@0: }; sl@0: sl@0: #endif sl@0: sl@0: /** Define this macro to reference the set of all capabilities. sl@0: @internalTechnology sl@0: */ sl@0: #ifdef __REFERENCE_ALL_SUPPORTED_CAPABILITIES__ sl@0: sl@0: extern const SCapabilitySet AllSupportedCapabilities; sl@0: sl@0: #endif //__REFERENCE_ALL_SUPPORTED_CAPABILITIES__ sl@0: sl@0: /** Define this macro to include the set of all capabilities. sl@0: @internalTechnology sl@0: */ sl@0: #ifdef __INCLUDE_ALL_SUPPORTED_CAPABILITIES__ sl@0: sl@0: /** The set of all capabilities. sl@0: @internalTechnology sl@0: */ sl@0: const SCapabilitySet AllSupportedCapabilities = { sl@0: { sl@0: ECapability_Limit<32 ? (TUint32)((1u<<(ECapability_Limit&31))-1u) : 0xffffffffu sl@0: , sl@0: ECapability_Limit>=32 ? (TUint32)((1u<<(ECapability_Limit&31))-1u) : 0u sl@0: } sl@0: }; sl@0: sl@0: #endif // __INCLUDE_ALL_SUPPORTED_CAPABILITIES__ sl@0: sl@0: #ifndef __KERNEL_MODE__ sl@0: class RProcess; sl@0: class RThread; sl@0: class RMessagePtr2; sl@0: class RSessionBase; sl@0: #else sl@0: class DProcess; sl@0: class DThread; sl@0: #endif sl@0: sl@0: /** Class representing all security attributes of a process or DLL. sl@0: These comprise a set of capabilities, a Secure ID and a Vendor ID. sl@0: sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: class TSecurityInfo sl@0: { sl@0: public: sl@0: inline TSecurityInfo(); sl@0: #ifdef __KERNEL_MODE__ sl@0: IMPORT_C TSecurityInfo(DProcess* aProcess); sl@0: IMPORT_C TSecurityInfo(DThread* aThread); sl@0: #else sl@0: IMPORT_C TSecurityInfo(RProcess aProcess); sl@0: IMPORT_C TSecurityInfo(RThread aThread); sl@0: IMPORT_C TSecurityInfo(RMessagePtr2 aMesPtr); sl@0: inline void Set(RProcess aProcess); sl@0: inline void Set(RThread aThread); sl@0: inline void Set(RMessagePtr2 aMsgPtr); sl@0: TInt Set(RSessionBase aSession); /**< @internalComponent */ sl@0: inline void SetToCurrentInfo(); sl@0: IMPORT_C void SetToCreatorInfo(); sl@0: #endif //__KERNEL_MODE__ sl@0: public: sl@0: TSecureId iSecureId; /**< Secure ID */ sl@0: TVendorId iVendorId; /**< Vendor ID */ sl@0: TCapabilitySet iCaps; /**< Capability Set */ sl@0: }; sl@0: sl@0: sl@0: /** Class representing a generic security policy sl@0: sl@0: This class can specify a security policy consisting of either: sl@0: sl@0: -# A check for between 0 and 7 capabilities sl@0: -# A check for a given Secure ID along with 0-3 capabilities sl@0: -# A check for a given Vendor ID along with 0-3 capabilities sl@0: sl@0: If multiple capabilities are specified, all of them must be present for the sl@0: security check to succeed ('AND' relation). sl@0: sl@0: The envisaged use case for this class is to specify access rights to an object sl@0: managed either by the kernel or by a server but in principle owned by a client sl@0: and usable in a limited way by other clients. For example sl@0: - Publish and Subscribe properties sl@0: - DBMS databases sl@0: sl@0: In these cases the owning client would pass one (or more) of these objects to sl@0: the server to specify which security checks should be done on other clients sl@0: before allowing access to the object. sl@0: sl@0: To pass a TSecurityPolicy object via IPC, a client should obtain a descriptor sl@0: for the object using Package() and send this. When a server receives this descriptor sl@0: it should read the descriptor contents into a TSecurityPolicyBuf and then sl@0: Set() should be used to create a policy object from this. sl@0: sl@0: Because this class has non-default constructors, compilers will not initialise sl@0: this object at compile time, instead code will be generated to construct the object sl@0: at run-time. This is wasteful - and Symbian OS DLLs are not permitted to have sl@0: such uninitialised data. To overcome these problems a set of macros are provided to sl@0: construct a const object which behaves like a TSecurityPolicy. These are: sl@0: sl@0: _LIT_SECURITY_POLICY_C1 through _LIT_SECURITY_POLICY_C7, sl@0: _LIT_SECURITY_POLICY_S0 through _LIT_SECURITY_POLICY_S3 and sl@0: _LIT_SECURITY_POLICY_V0 through _LIT_SECURITY_POLICY_V3. sl@0: sl@0: Also, the macros _LIT_SECURITY_POLICY_PASS and _LIT_SECURITY_POLICY_FAIL are provided sl@0: in order to allow easy construction of a const object which can be used as a sl@0: TSecuityPolicy which always passes or always fails, respectively. sl@0: sl@0: If a security policy object is needed to be embedded in another class then the sl@0: TStaticSecurityPolicy structure can be used. This behaves in the same way as a sl@0: TSecurityPolicy object but may be initialised at compile time. sl@0: sl@0: @see TStaticSecurityPolicy sl@0: @see TSecurityPolicyBuf sl@0: @see _LIT_SECURITY_POLICY_PASS sl@0: @see _LIT_SECURITY_POLICY_FAIL sl@0: @see _LIT_SECURITY_POLICY_C1 sl@0: @see _LIT_SECURITY_POLICY_C2 sl@0: @see _LIT_SECURITY_POLICY_C3 sl@0: @see _LIT_SECURITY_POLICY_C4 sl@0: @see _LIT_SECURITY_POLICY_C5 sl@0: @see _LIT_SECURITY_POLICY_C6 sl@0: @see _LIT_SECURITY_POLICY_C7 sl@0: @see _LIT_SECURITY_POLICY_S0 sl@0: @see _LIT_SECURITY_POLICY_S1 sl@0: @see _LIT_SECURITY_POLICY_S2 sl@0: @see _LIT_SECURITY_POLICY_S3 sl@0: @see _LIT_SECURITY_POLICY_V0 sl@0: @see _LIT_SECURITY_POLICY_V1 sl@0: @see _LIT_SECURITY_POLICY_V2 sl@0: @see _LIT_SECURITY_POLICY_V3 sl@0: sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: class TSecurityPolicy sl@0: { sl@0: public: sl@0: enum TSecPolicyType sl@0: { sl@0: EAlwaysFail=0, sl@0: EAlwaysPass=1, sl@0: }; sl@0: sl@0: public: sl@0: inline TSecurityPolicy(); sl@0: IMPORT_C TSecurityPolicy(TSecPolicyType aType); sl@0: IMPORT_C TSecurityPolicy(TCapability aCap1, TCapability aCap2 = ECapability_None, TCapability aCap3 = ECapability_None); sl@0: IMPORT_C TSecurityPolicy(TCapability aCap1, TCapability aCap2, TCapability aCap3, TCapability aCap4, TCapability aCap5 = ECapability_None, TCapability aCap6 = ECapability_None, TCapability aCap7 = ECapability_None); sl@0: IMPORT_C TSecurityPolicy(TSecureId aSecureId, TCapability aCap1 = ECapability_None, TCapability aCap2 = ECapability_None, TCapability aCap3 = ECapability_None); sl@0: IMPORT_C TSecurityPolicy(TVendorId aVendorId, TCapability aCap1 = ECapability_None, TCapability aCap2 = ECapability_None, TCapability aCap3 = ECapability_None); sl@0: IMPORT_C TInt Set(const TDesC8& aDes); sl@0: IMPORT_C TPtrC8 Package() const; sl@0: sl@0: #ifdef __KERNEL_MODE__ sl@0: sl@0: #ifndef __REMOVE_PLATSEC_DIAGNOSTIC_STRINGS__ sl@0: inline TBool CheckPolicy(DProcess* aProcess, const char* aDiagnostic=0) const; sl@0: inline TBool CheckPolicy(DThread* aThread, const char* aDiagnostic=0) const; sl@0: #else //__REMOVE_PLATSEC_DIAGNOSTIC_STRINGS__ sl@0: // Only available to NULL arguments sl@0: inline TBool CheckPolicy(DProcess* aProcess, OnlyCreateWithNull aDiagnostic=NULL) const; sl@0: inline TBool CheckPolicy(DThread* aThread, OnlyCreateWithNull aDiagnostic=NULL) const; sl@0: #endif // !__REMOVE_PLATSEC_DIAGNOSTIC_STRINGS__ sl@0: sl@0: #else // !__KERNEL_MODE__ sl@0: sl@0: #ifndef __REMOVE_PLATSEC_DIAGNOSTIC_STRINGS__ sl@0: inline TBool CheckPolicy(RProcess aProcess, const char* aDiagnostic=0) const; sl@0: inline TBool CheckPolicy(RThread aThread, const char* aDiagnostic=0) const; sl@0: inline TBool CheckPolicy(RMessagePtr2 aMsgPtr, const char* aDiagnostic=0) const; sl@0: inline TBool CheckPolicy(RMessagePtr2 aMsgPtr, TSecurityInfo& aMissing, const char* aDiagnostic=0) const; sl@0: inline TBool CheckPolicyCreator(const char* aDiagnostic=0) const; sl@0: #else //__REMOVE_PLATSEC_DIAGNOSTIC_STRINGS__ sl@0: // Only available to NULL arguments sl@0: inline TBool CheckPolicy(RProcess aProcess, OnlyCreateWithNull aDiagnostic=NULL) const; sl@0: inline TBool CheckPolicy(RThread aThread, OnlyCreateWithNull aDiagnostic=NULL) const; sl@0: inline TBool CheckPolicy(RMessagePtr2 aMsgPtr, OnlyCreateWithNull aDiagnostic=NULL) const; sl@0: inline TBool CheckPolicy(RMessagePtr2 aMsgPtr, TSecurityInfo& aMissing, OnlyCreateWithNull aDiagnostic=NULL) const; sl@0: inline TBool CheckPolicyCreator(OnlyCreateWithNull aDiagnostic=NULL) const; sl@0: #ifndef __REMOVE_PLATSEC_DIAGNOSTICS__ sl@0: // For things using KSuppressPlatSecDiagnostic sl@0: inline TBool CheckPolicy(RProcess aProcess, OnlyCreateWithNull aDiagnostic, OnlyCreateWithNull aSuppress) const; sl@0: inline TBool CheckPolicy(RThread aThread, OnlyCreateWithNull aDiagnostic, OnlyCreateWithNull aSuppress) const; sl@0: inline TBool CheckPolicy(RMessagePtr2 aMsgPtr, OnlyCreateWithNull aDiagnostic, OnlyCreateWithNull aSuppress) const; sl@0: inline TBool CheckPolicy(RMessagePtr2 aMsgPtr, TSecurityInfo& aMissing, OnlyCreateWithNull aDiagnostic, OnlyCreateWithNull aSuppress) const; sl@0: inline TBool CheckPolicyCreator(OnlyCreateWithNull aDiagnostic, OnlyCreateWithNull aSuppress) const; sl@0: #endif // !__REMOVE_PLATSEC_DIAGNOSTICS__ sl@0: #endif // !__REMOVE_PLATSEC_DIAGNOSTIC_STRINGS__ sl@0: TInt CheckPolicy(RSessionBase aSession) const; /**< @internalComponent */ sl@0: sl@0: #endif //__KERNEL_MODE__ sl@0: sl@0: TBool Validate() const; sl@0: sl@0: private: sl@0: #ifdef __KERNEL_MODE__ sl@0: IMPORT_C TBool DoCheckPolicy(DProcess* aProcess, const char* aDiagnostic) const; sl@0: IMPORT_C TBool DoCheckPolicy(DProcess* aProcess) const; sl@0: IMPORT_C TBool DoCheckPolicy(DThread* aThread, const char* aDiagnostic) const; sl@0: IMPORT_C TBool DoCheckPolicy(DThread* aThread) const; sl@0: #else // !__KERNEL_MODE__ sl@0: IMPORT_C TBool DoCheckPolicy(RProcess aProcess, const char* aDiagnostic) const; sl@0: IMPORT_C TBool DoCheckPolicy(RProcess aProcess) const; sl@0: IMPORT_C TBool DoCheckPolicy(RThread aThread, const char* aDiagnostic) const; sl@0: IMPORT_C TBool DoCheckPolicy(RThread aThread) const; sl@0: IMPORT_C TBool DoCheckPolicy(RMessagePtr2 aMsgPtr, const char* aDiagnostic) const; sl@0: IMPORT_C TBool DoCheckPolicy(RMessagePtr2 aMsgPtr) const; sl@0: IMPORT_C TBool DoCheckPolicyCreator(const char* aDiagnostic) const; sl@0: IMPORT_C TBool DoCheckPolicyCreator() const; sl@0: #ifndef __REMOVE_PLATSEC_DIAGNOSTICS__ sl@0: TBool DoCheckPolicy(RMessagePtr2 aMsgPtr, TSecurityInfo& aMissing, const char* aDiagnostic) const; sl@0: #endif //__REMOVE_PLATSEC_DIAGNOSTICS__ sl@0: TBool DoCheckPolicy(RMessagePtr2 aMsgPtr, TSecurityInfo& aMissing) const; sl@0: #endif //__KERNEL_MODE__ sl@0: sl@0: public: sl@0: /** Constants to specify the type of TSecurityPolicy objects. sl@0: */ sl@0: enum TType sl@0: { sl@0: ETypeFail=0, /**< Always fail*/ sl@0: ETypePass=1, /**< Always pass*/ sl@0: ETypeC3=2, /**< Up to 3 capabilities*/ sl@0: ETypeC7=3, /**< Up to 7 capabilities*/ sl@0: ETypeS3=4, /**< Secure ID and up to 3 capabilities*/ sl@0: ETypeV3=5, /**< Vendor ID and up to 3 capabilities*/ sl@0: sl@0: /** The number of possible TSecurityPolicy types sl@0: This is intended for internal Symbian use only. sl@0: @internalTechnology sl@0: */ sl@0: ETypeLimit sl@0: sl@0: // other values may be added to indicate expanded policy objects (future extensions) sl@0: }; sl@0: protected: sl@0: TBool CheckPolicy(const SSecurityInfo& aSecInfo, SSecurityInfo& aMissing) const; sl@0: private: sl@0: void ConstructAndCheck3(TCapability aCap1, TCapability aCap2, TCapability aCap3); sl@0: private: sl@0: TUint8 iType; sl@0: TUint8 iCaps[3]; // missing capabilities are set to 0xff sl@0: union sl@0: { sl@0: TUint32 iSecureId; sl@0: TUint32 iVendorId; sl@0: TUint8 iExtraCaps[4]; // missing capabilities are set to 0xff sl@0: }; sl@0: friend class TCompiledSecurityPolicy; sl@0: }; sl@0: sl@0: /** Provides a TPkcgBuf wrapper for a descriptorised TSecurityPolicy. This a sl@0: suitable container for passing a security policy across IPC. sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: typedef TPckgBuf TSecurityPolicyBuf; sl@0: sl@0: sl@0: /** Structure for compile-time initialisation of a security policy. sl@0: sl@0: This structure behaves in the same way as a TSecurityPolicy object but has sl@0: the advantage that it may be initialised at compile time. E.g. sl@0: the following line defines a security policy 'KSecurityPolictReadUserData' sl@0: which checks ReadUserData capability. sl@0: sl@0: @code sl@0: _LIT_SECURITY_POLICY_C1(KSecurityPolictReadUserData,ECapabilityReadUserData) sl@0: @endcode sl@0: sl@0: Or, an array of security policies may be created like this: sl@0: @code sl@0: static const TStaticSecurityPolicy MyPolicies[] = sl@0: { sl@0: _INIT_SECURITY_POLICY_C1(ECapabilityReadUserData), sl@0: _INIT_SECURITY_POLICY_PASS(), sl@0: _INIT_SECURITY_POLICY_S0(0x1234567) sl@0: } sl@0: @endcode sl@0: sl@0: This class should not be initialised directly, instead one of the following sl@0: macros should be used: sl@0: sl@0: - _INIT_SECURITY_POLICY_PASS sl@0: - _INIT_SECURITY_POLICY_FAIL sl@0: - _INIT_SECURITY_POLICY_C1 sl@0: - _INIT_SECURITY_POLICY_C2 sl@0: - _INIT_SECURITY_POLICY_C3 sl@0: - _INIT_SECURITY_POLICY_C4 sl@0: - _INIT_SECURITY_POLICY_C5 sl@0: - _INIT_SECURITY_POLICY_C6 sl@0: - _INIT_SECURITY_POLICY_C7 sl@0: - _INIT_SECURITY_POLICY_S0 sl@0: - _INIT_SECURITY_POLICY_S1 sl@0: - _INIT_SECURITY_POLICY_S2 sl@0: - _INIT_SECURITY_POLICY_S3 sl@0: - _INIT_SECURITY_POLICY_V0 sl@0: - _INIT_SECURITY_POLICY_V1 sl@0: - _INIT_SECURITY_POLICY_V2 sl@0: - _INIT_SECURITY_POLICY_V3 sl@0: - _LIT_SECURITY_POLICY_PASS sl@0: - _LIT_SECURITY_POLICY_FAIL sl@0: - _LIT_SECURITY_POLICY_C1 sl@0: - _LIT_SECURITY_POLICY_C2 sl@0: - _LIT_SECURITY_POLICY_C3 sl@0: - _LIT_SECURITY_POLICY_C4 sl@0: - _LIT_SECURITY_POLICY_C5 sl@0: - _LIT_SECURITY_POLICY_C6 sl@0: - _LIT_SECURITY_POLICY_C7 sl@0: - _LIT_SECURITY_POLICY_S0 sl@0: - _LIT_SECURITY_POLICY_S1 sl@0: - _LIT_SECURITY_POLICY_S2 sl@0: - _LIT_SECURITY_POLICY_S3 sl@0: - _LIT_SECURITY_POLICY_V0 sl@0: - _LIT_SECURITY_POLICY_V1 sl@0: - _LIT_SECURITY_POLICY_V2 sl@0: - _LIT_SECURITY_POLICY_V3 sl@0: sl@0: @see TSecurityPolicy sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: struct TStaticSecurityPolicy sl@0: { sl@0: inline const TSecurityPolicy* operator&() const; sl@0: inline operator const TSecurityPolicy&() const; sl@0: inline const TSecurityPolicy& operator()() const; sl@0: sl@0: #ifndef __KERNEL_MODE__ sl@0: #ifndef __REMOVE_PLATSEC_DIAGNOSTIC_STRINGS__ sl@0: inline TBool CheckPolicy(RProcess aProcess, const char* aDiagnostic=0) const; sl@0: inline TBool CheckPolicy(RThread aThread, const char* aDiagnostic=0) const; sl@0: inline TBool CheckPolicy(RMessagePtr2 aMsgPtr, const char* aDiagnostic=0) const; sl@0: inline TBool CheckPolicy(RMessagePtr2 aMsgPtr, TSecurityInfo& aMissing, const char* aDiagnostic=0) const; sl@0: inline TBool CheckPolicyCreator(const char* aDiagnostic=0) const; sl@0: #else //__REMOVE_PLATSEC_DIAGNOSTIC_STRINGS__ sl@0: // Only available to NULL arguments sl@0: inline TBool CheckPolicy(RProcess aProcess, OnlyCreateWithNull aDiagnostic=NULL) const; sl@0: inline TBool CheckPolicy(RThread aThread, OnlyCreateWithNull aDiagnostic=NULL) const; sl@0: inline TBool CheckPolicy(RMessagePtr2 aMsgPtr, OnlyCreateWithNull aDiagnostic=NULL) const; sl@0: inline TBool CheckPolicy(RMessagePtr2 aMsgPtr, TSecurityInfo& aMissing, OnlyCreateWithNull aDiagnostic=NULL) const; sl@0: inline TBool CheckPolicyCreator(OnlyCreateWithNull aDiagnostic=NULL) const; sl@0: #ifndef __REMOVE_PLATSEC_DIAGNOSTICS__ sl@0: // For things using KSuppressPlatSecDiagnostic sl@0: inline TBool CheckPolicy(RProcess aProcess, OnlyCreateWithNull aDiagnostic, OnlyCreateWithNull aSuppress) const; sl@0: inline TBool CheckPolicy(RThread aThread, OnlyCreateWithNull aDiagnostic, OnlyCreateWithNull aSuppress) const; sl@0: inline TBool CheckPolicy(RMessagePtr2 aMsgPtr, OnlyCreateWithNull aDiagnostic, OnlyCreateWithNull aSuppress) const; sl@0: inline TBool CheckPolicy(RMessagePtr2 aMsgPtr, TSecurityInfo& aMissing, OnlyCreateWithNull aDiagnostic, OnlyCreateWithNull aSuppress) const; sl@0: inline TBool CheckPolicyCreator(OnlyCreateWithNull aDiagnostic, OnlyCreateWithNull aSuppress) const; sl@0: #endif // !__REMOVE_PLATSEC_DIAGNOSTICS__ sl@0: #endif // !__REMOVE_PLATSEC_DIAGNOSTIC_STRINGS__ sl@0: #endif // !__KERNEL_MODE__ sl@0: sl@0: TUint32 iA; /**< @internalComponent */ sl@0: TUint32 iB; /**< @internalComponent */ sl@0: }; sl@0: sl@0: sl@0: /** sl@0: A dummy enum for use by the CAPABILITY_AS_TUINT8 macro sl@0: @internalComponent sl@0: */ sl@0: enum __invalid_capability_value {}; sl@0: sl@0: /** sl@0: A macro to cast a TCapability to a TUint8. sl@0: sl@0: If an invlid capability value is specified then, dependant on the compiler, sl@0: a compile time error or warning will be produced which includes the label sl@0: "__invalid_capability_value" sl@0: sl@0: @param cap The capability value sl@0: @internalComponent sl@0: */ sl@0: #define CAPABILITY_AS_TUINT8(cap) \ sl@0: ((TUint8)(int)( \ sl@0: (cap)==ECapability_None \ sl@0: ? (__invalid_capability_value(*)[1])(ECapability_None) \ sl@0: : (__invalid_capability_value(*)[((TUint)(cap+1)<=(TUint)ECapability_Limit)?1:2])(cap) \ sl@0: )) sl@0: sl@0: sl@0: /** sl@0: A macro to construct a TUint32 from four TUint8s. The TUint32 is in BigEndian sl@0: ordering useful for class layout rather than number generation. sl@0: sl@0: @param i1 The first TUint8 sl@0: @param i2 The second TUint8 sl@0: @param i3 The third TUint8 sl@0: @param i4 The fourth TUint8 sl@0: @internalComponent sl@0: */ sl@0: #define FOUR_TUINT8(i1,i2,i3,i4) \ sl@0: (TUint32)( \ sl@0: (TUint8)i1 | \ sl@0: (TUint8)i2 << 8 | \ sl@0: (TUint8)i3 << 16 | \ sl@0: (TUint8)i4 << 24 \ sl@0: ) sl@0: sl@0: sl@0: /** Macro for compile-time initialisation of a security policy object that sl@0: always fails. That is, checks against this policy will always fail, sl@0: irrespective of the security attributes of the item being checked. sl@0: sl@0: The object declared has an implicit conversion to const TSecurityPolicy&. sl@0: Taking the address of the object will return a const TSecurityPolicy*. sl@0: Explicit conversion to const TSecurityPolicy& may be effected by using the sl@0: function call operator n(). sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #define _INIT_SECURITY_POLICY_FAIL \ sl@0: { \ sl@0: FOUR_TUINT8( \ sl@0: (TUint8)TSecurityPolicy::ETypeFail, \ sl@0: (TUint8)0xff, \ sl@0: (TUint8)0xff, \ sl@0: (TUint8)0xff \ sl@0: ), \ sl@0: (TUint32)0xffffffff \ sl@0: } sl@0: sl@0: sl@0: /** Macro for compile-time definition of a security policy object that always sl@0: fails. That is, checks against this policy will always fail, irrespective of sl@0: the security attributes of the item being checked. sl@0: sl@0: The object declared has an implicit conversion to const TSecurityPolicy&. sl@0: Taking the address of the object will return a const TSecurityPolicy*. sl@0: Explicit conversion to const TSecurityPolicy& may be effected by using the sl@0: function call operator n(). sl@0: @param n Name to use for policy object sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #define _LIT_SECURITY_POLICY_FAIL(n) const TStaticSecurityPolicy n = _INIT_SECURITY_POLICY_FAIL sl@0: sl@0: sl@0: /** Macro for compile-time initialisation of a security policy object that sl@0: always passes. That is, checks against this policy will always pass, sl@0: irrespective of the security attributes of the item being checked. sl@0: sl@0: The object declared has an implicit conversion to const TSecurityPolicy&. sl@0: Taking the address of the object will return a const TSecurityPolicy*. sl@0: Explicit conversion to const TSecurityPolicy& may be effected by using the sl@0: function call operator n(). sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #define _INIT_SECURITY_POLICY_PASS \ sl@0: { \ sl@0: FOUR_TUINT8( \ sl@0: (TUint8)TSecurityPolicy::ETypePass, \ sl@0: (TUint8)0xff, \ sl@0: (TUint8)0xff, \ sl@0: (TUint8)0xff \ sl@0: ), \ sl@0: (TUint32)0xffffffff \ sl@0: } sl@0: sl@0: sl@0: /** Macro for compile-time definition of a security policy object that always sl@0: passes. That is, checks against this policy will always pass, irrespective of sl@0: the security attributes of the item being checked. sl@0: sl@0: The object declared has an implicit conversion to const TSecurityPolicy&. sl@0: Taking the address of the object will return a const TSecurityPolicy*. sl@0: Explicit conversion to const TSecurityPolicy& may be effected by using the sl@0: function call operator n(). sl@0: @param n Name to use for policy object sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #define _LIT_SECURITY_POLICY_PASS(n) const TStaticSecurityPolicy n = _INIT_SECURITY_POLICY_PASS sl@0: sl@0: sl@0: /** Macro for compile-time initialisation of a security policy object sl@0: The policy will check for seven capabilities. sl@0: sl@0: The object declared has an implicit conversion to const TSecurityPolicy&. sl@0: Taking the address of the object will return a const TSecurityPolicy*. sl@0: Explicit conversion to const TSecurityPolicy& may be effected by using the sl@0: function call operator n(). sl@0: sl@0: If an invlid capability value is specified then, dependant on the compiler, sl@0: a compile time error or warning will be produced which includes the label sl@0: "__invalid_capability_value" sl@0: sl@0: @param c1 The first capability to check (enumerator of TCapability) sl@0: @param c2 The second capability to check (enumerator of TCapability) sl@0: @param c3 The third capability to check (enumerator of TCapability) sl@0: @param c4 The fourth capability to check (enumerator of TCapability) sl@0: @param c5 The fifth capability to check (enumerator of TCapability) sl@0: @param c6 The sixth capability to check (enumerator of TCapability) sl@0: @param c7 The seventh capability to check (enumerator of TCapability) sl@0: sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #define _INIT_SECURITY_POLICY_C7(c1,c2,c3,c4,c5,c6,c7) \ sl@0: { \ sl@0: FOUR_TUINT8( \ sl@0: (TUint8)TSecurityPolicy::ETypeC7, \ sl@0: CAPABILITY_AS_TUINT8(c1), \ sl@0: CAPABILITY_AS_TUINT8(c2), \ sl@0: CAPABILITY_AS_TUINT8(c3) \ sl@0: ), \ sl@0: FOUR_TUINT8( \ sl@0: CAPABILITY_AS_TUINT8(c4), \ sl@0: CAPABILITY_AS_TUINT8(c5), \ sl@0: CAPABILITY_AS_TUINT8(c6), \ sl@0: CAPABILITY_AS_TUINT8(c7) \ sl@0: ) \ sl@0: } sl@0: sl@0: sl@0: /** Macro for compile-time definition of a security policy object sl@0: The policy will check for seven capabilities. sl@0: sl@0: The object declared has an implicit conversion to const TSecurityPolicy&. sl@0: Taking the address of the object will return a const TSecurityPolicy*. sl@0: Explicit conversion to const TSecurityPolicy& may be effected by using the sl@0: function call operator n(). sl@0: sl@0: If an invlid capability value is specified then, dependant on the compiler, sl@0: a compile time error or warning will be produced which includes the label sl@0: "__invalid_capability_value" sl@0: sl@0: @param n Name to use for policy object sl@0: @param c1 The first capability to check (enumerator of TCapability) sl@0: @param c2 The second capability to check (enumerator of TCapability) sl@0: @param c3 The third capability to check (enumerator of TCapability) sl@0: @param c4 The fourth capability to check (enumerator of TCapability) sl@0: @param c5 The fifth capability to check (enumerator of TCapability) sl@0: @param c6 The sixth capability to check (enumerator of TCapability) sl@0: @param c7 The seventh capability to check (enumerator of TCapability) sl@0: sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #define _LIT_SECURITY_POLICY_C7(n,c1,c2,c3,c4,c5,c6,c7) \ sl@0: const TStaticSecurityPolicy n = _INIT_SECURITY_POLICY_C7(c1,c2,c3,c4,c5,c6,c7) sl@0: sl@0: sl@0: /** Macro for compile-time initialisation of a security policy object sl@0: The policy will check for six capabilities. sl@0: sl@0: The object declared has an implicit conversion to const TSecurityPolicy&. sl@0: Taking the address of the object will return a const TSecurityPolicy*. sl@0: Explicit conversion to const TSecurityPolicy& may be effected by using the sl@0: function call operator n(). sl@0: sl@0: If an invlid capability value is specified then, dependant on the compiler, sl@0: a compile time error or warning will be produced which includes the label sl@0: "__invalid_capability_value" sl@0: sl@0: @param c1 The first capability to check (enumerator of TCapability) sl@0: @param c2 The second capability to check (enumerator of TCapability) sl@0: @param c3 The third capability to check (enumerator of TCapability) sl@0: @param c4 The fourth capability to check (enumerator of TCapability) sl@0: @param c5 The fifth capability to check (enumerator of TCapability) sl@0: @param c6 The sixth capability to check (enumerator of TCapability) sl@0: sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #define _INIT_SECURITY_POLICY_C6(c1,c2,c3,c4,c5,c6) \ sl@0: _INIT_SECURITY_POLICY_C7(c1,c2,c3,c4,c5,c6,ECapability_None) sl@0: sl@0: sl@0: /** Macro for compile-time definition of a security policy object sl@0: The policy will check for six capabilities. sl@0: sl@0: The object declared has an implicit conversion to const TSecurityPolicy&. sl@0: Taking the address of the object will return a const TSecurityPolicy*. sl@0: Explicit conversion to const TSecurityPolicy& may be effected by using the sl@0: function call operator n(). sl@0: sl@0: If an invlid capability value is specified then, dependant on the compiler, sl@0: a compile time error or warning will be produced which includes the label sl@0: "__invalid_capability_value" sl@0: sl@0: @param n Name to use for policy object sl@0: @param c1 The first capability to check (enumerator of TCapability) sl@0: @param c2 The second capability to check (enumerator of TCapability) sl@0: @param c3 The third capability to check (enumerator of TCapability) sl@0: @param c4 The fourth capability to check (enumerator of TCapability) sl@0: @param c5 The fifth capability to check (enumerator of TCapability) sl@0: @param c6 The sixth capability to check (enumerator of TCapability) sl@0: sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #define _LIT_SECURITY_POLICY_C6(n,c1,c2,c3,c4,c5,c6) \ sl@0: _LIT_SECURITY_POLICY_C7(n,c1,c2,c3,c4,c5,c6,ECapability_None) sl@0: sl@0: sl@0: /** Macro for compile-time initialisation of a security policy object sl@0: The policy will check for five capabilities. sl@0: sl@0: The object declared has an implicit conversion to const TSecurityPolicy&. sl@0: Taking the address of the object will return a const TSecurityPolicy*. sl@0: Explicit conversion to const TSecurityPolicy& may be effected by using the sl@0: function call operator n(). sl@0: sl@0: If an invlid capability value is specified then, dependant on the compiler, sl@0: a compile time error or warning will be produced which includes the label sl@0: "__invalid_capability_value" sl@0: sl@0: @param c1 The first capability to check (enumerator of TCapability) sl@0: @param c2 The second capability to check (enumerator of TCapability) sl@0: @param c3 The third capability to check (enumerator of TCapability) sl@0: @param c4 The fourth capability to check (enumerator of TCapability) sl@0: @param c5 The fifth capability to check (enumerator of TCapability) sl@0: sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #define _INIT_SECURITY_POLICY_C5(c1,c2,c3,c4,c5) \ sl@0: _INIT_SECURITY_POLICY_C7(c1,c2,c3,c4,c5,ECapability_None,ECapability_None) sl@0: sl@0: sl@0: /** Macro for compile-time definition of a security policy object sl@0: The policy will check for five capabilities. sl@0: sl@0: The object declared has an implicit conversion to const TSecurityPolicy&. sl@0: Taking the address of the object will return a const TSecurityPolicy*. sl@0: Explicit conversion to const TSecurityPolicy& may be effected by using the sl@0: function call operator n(). sl@0: sl@0: If an invlid capability value is specified then, dependant on the compiler, sl@0: a compile time error or warning will be produced which includes the label sl@0: "__invalid_capability_value" sl@0: sl@0: @param n Name to use for policy object sl@0: @param c1 The first capability to check (enumerator of TCapability) sl@0: @param c2 The second capability to check (enumerator of TCapability) sl@0: @param c3 The third capability to check (enumerator of TCapability) sl@0: @param c4 The fourth capability to check (enumerator of TCapability) sl@0: @param c5 The fifth capability to check (enumerator of TCapability) sl@0: sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #define _LIT_SECURITY_POLICY_C5(n,c1,c2,c3,c4,c5) \ sl@0: _LIT_SECURITY_POLICY_C7(n,c1,c2,c3,c4,c5,ECapability_None,ECapability_None) sl@0: sl@0: sl@0: /** Macro for compile-time initialisation of a security policy object sl@0: The policy will check for four capabilities. sl@0: sl@0: The object declared has an implicit conversion to const TSecurityPolicy&. sl@0: Taking the address of the object will return a const TSecurityPolicy*. sl@0: Explicit conversion to const TSecurityPolicy& may be effected by using the sl@0: function call operator n(). sl@0: sl@0: If an invlid capability value is specified then, dependant on the compiler, sl@0: a compile time error or warning will be produced which includes the label sl@0: "__invalid_capability_value" sl@0: sl@0: @param c1 The first capability to check (enumerator of TCapability) sl@0: @param c2 The second capability to check (enumerator of TCapability) sl@0: @param c3 The third capability to check (enumerator of TCapability) sl@0: @param c4 The fourth capability to check (enumerator of TCapability) sl@0: sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #define _INIT_SECURITY_POLICY_C4(c1,c2,c3,c4) \ sl@0: _INIT_SECURITY_POLICY_C7(c1,c2,c3,c4,ECapability_None,ECapability_None,ECapability_None) sl@0: sl@0: sl@0: /** Macro for compile-time definition of a security policy object sl@0: The policy will check for four capabilities. sl@0: sl@0: The object declared has an implicit conversion to const TSecurityPolicy&. sl@0: Taking the address of the object will return a const TSecurityPolicy*. sl@0: Explicit conversion to const TSecurityPolicy& may be effected by using the sl@0: function call operator n(). sl@0: sl@0: If an invlid capability value is specified then, dependant on the compiler, sl@0: a compile time error or warning will be produced which includes the label sl@0: "__invalid_capability_value" sl@0: sl@0: @param n Name to use for policy object sl@0: @param c1 The first capability to check (enumerator of TCapability) sl@0: @param c2 The second capability to check (enumerator of TCapability) sl@0: @param c3 The third capability to check (enumerator of TCapability) sl@0: @param c4 The fourth capability to check (enumerator of TCapability) sl@0: sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #define _LIT_SECURITY_POLICY_C4(n,c1,c2,c3,c4) \ sl@0: _LIT_SECURITY_POLICY_C7(n,c1,c2,c3,c4,ECapability_None,ECapability_None,ECapability_None) sl@0: sl@0: sl@0: /** Macro for compile-time initialisation of a security policy object sl@0: The policy will check for three capabilities. sl@0: sl@0: The object declared has an implicit conversion to const TSecurityPolicy&. sl@0: Taking the address of the object will return a const TSecurityPolicy*. sl@0: Explicit conversion to const TSecurityPolicy& may be effected by using the sl@0: function call operator n(). sl@0: sl@0: If an invlid capability value is specified then, dependant on the compiler, sl@0: a compile time error or warning will be produced which includes the label sl@0: "__invalid_capability_value" sl@0: sl@0: @param c1 The first capability to check (enumerator of TCapability) sl@0: @param c2 The second capability to check (enumerator of TCapability) sl@0: @param c3 The third capability to check (enumerator of TCapability) sl@0: sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #define _INIT_SECURITY_POLICY_C3(c1,c2,c3) \ sl@0: { \ sl@0: FOUR_TUINT8( \ sl@0: (TUint8)TSecurityPolicy::ETypeC3, \ sl@0: CAPABILITY_AS_TUINT8(c1), \ sl@0: CAPABILITY_AS_TUINT8(c2), \ sl@0: CAPABILITY_AS_TUINT8(c3) \ sl@0: ), \ sl@0: (TUint32)0xffffffff \ sl@0: } sl@0: sl@0: sl@0: /** Macro for compile-time definition of a security policy object sl@0: The policy will check for three capabilities. sl@0: sl@0: The object declared has an implicit conversion to const TSecurityPolicy&. sl@0: Taking the address of the object will return a const TSecurityPolicy*. sl@0: Explicit conversion to const TSecurityPolicy& may be effected by using the sl@0: function call operator n(). sl@0: sl@0: If an invlid capability value is specified then, dependant on the compiler, sl@0: a compile time error or warning will be produced which includes the label sl@0: "__invalid_capability_value" sl@0: sl@0: @param n Name to use for policy object sl@0: @param c1 The first capability to check (enumerator of TCapability) sl@0: @param c2 The second capability to check (enumerator of TCapability) sl@0: @param c3 The third capability to check (enumerator of TCapability) sl@0: sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #define _LIT_SECURITY_POLICY_C3(n,c1,c2,c3) \ sl@0: const TStaticSecurityPolicy n = _INIT_SECURITY_POLICY_C3(c1,c2,c3) sl@0: sl@0: sl@0: /** Macro for compile-time initialisation of a security policy object sl@0: The policy will check for two capabilities. sl@0: sl@0: The object declared has an implicit conversion to const TSecurityPolicy&. sl@0: Taking the address of the object will return a const TSecurityPolicy*. sl@0: Explicit conversion to const TSecurityPolicy& may be effected by using the sl@0: function call operator n(). sl@0: sl@0: If an invlid capability value is specified then, dependant on the compiler, sl@0: a compile time error or warning will be produced which includes the label sl@0: "__invalid_capability_value" sl@0: sl@0: @param c1 The first capability to check (enumerator of TCapability) sl@0: @param c2 The second capability to check (enumerator of TCapability) sl@0: sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #define _INIT_SECURITY_POLICY_C2(c1,c2) \ sl@0: _INIT_SECURITY_POLICY_C3(c1,c2,ECapability_None) sl@0: sl@0: sl@0: /** Macro for compile-time definition of a security policy object sl@0: The policy will check for two capabilities. sl@0: sl@0: The object declared has an implicit conversion to const TSecurityPolicy&. sl@0: Taking the address of the object will return a const TSecurityPolicy*. sl@0: Explicit conversion to const TSecurityPolicy& may be effected by using the sl@0: function call operator n(). sl@0: sl@0: If an invlid capability value is specified then, dependant on the compiler, sl@0: a compile time error or warning will be produced which includes the label sl@0: "__invalid_capability_value" sl@0: sl@0: @param n Name to use for policy object sl@0: @param c1 The first capability to check (enumerator of TCapability) sl@0: @param c2 The second capability to check (enumerator of TCapability) sl@0: sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #define _LIT_SECURITY_POLICY_C2(n,c1,c2) \ sl@0: _LIT_SECURITY_POLICY_C3(n,c1,c2,ECapability_None) sl@0: sl@0: sl@0: /** Macro for compile-time initialisation of a security policy object sl@0: The policy will check for one capability. sl@0: sl@0: The object declared has an implicit conversion to const TSecurityPolicy&. sl@0: Taking the address of the object will return a const TSecurityPolicy*. sl@0: Explicit conversion to const TSecurityPolicy& may be effected by using the sl@0: function call operator n(). sl@0: sl@0: If an invlid capability value is specified then, dependant on the compiler, sl@0: a compile time error or warning will be produced which includes the label sl@0: "__invalid_capability_value" sl@0: sl@0: @param c1 The first capability to check (enumerator of TCapability) sl@0: sl@0: sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #define _INIT_SECURITY_POLICY_C1(c1) \ sl@0: _INIT_SECURITY_POLICY_C3(c1,ECapability_None,ECapability_None) sl@0: sl@0: sl@0: /** Macro for compile-time definition of a security policy object sl@0: The policy will check for one capability. sl@0: sl@0: The object declared has an implicit conversion to const TSecurityPolicy&. sl@0: Taking the address of the object will return a const TSecurityPolicy*. sl@0: Explicit conversion to const TSecurityPolicy& may be effected by using the sl@0: function call operator n(). sl@0: sl@0: If an invlid capability value is specified then, dependant on the compiler, sl@0: a compile time error or warning will be produced which includes the label sl@0: "__invalid_capability_value" sl@0: sl@0: @param n Name to use for policy object sl@0: @param c1 The first capability to check (enumerator of TCapability) sl@0: sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #define _LIT_SECURITY_POLICY_C1(n,c1) \ sl@0: _LIT_SECURITY_POLICY_C3(n,c1,ECapability_None,ECapability_None) sl@0: sl@0: sl@0: /** Macro for compile-time initialisation of a security policy object sl@0: The policy will check for a secure ID and three capabilities. sl@0: sl@0: The object declared has an implicit conversion to const TSecurityPolicy&. sl@0: Taking the address of the object will return a const TSecurityPolicy*. sl@0: Explicit conversion to const TSecurityPolicy& may be effected by using the sl@0: function call operator n(). sl@0: sl@0: If an invlid capability value is specified then, dependant on the compiler, sl@0: a compile time error or warning be produced which includes the label sl@0: "__invalid_capability_value" sl@0: sl@0: @param sid The SID value to check for sl@0: @param c1 The first capability to check (enumerator of TCapability) sl@0: @param c2 The second capability to check (enumerator of TCapability) sl@0: @param c3 The third capability to check (enumerator of TCapability) sl@0: sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #define _INIT_SECURITY_POLICY_S3(sid,c1,c2,c3) \ sl@0: { \ sl@0: FOUR_TUINT8( \ sl@0: (TUint8)TSecurityPolicy::ETypeS3, \ sl@0: CAPABILITY_AS_TUINT8(c1), \ sl@0: CAPABILITY_AS_TUINT8(c2), \ sl@0: CAPABILITY_AS_TUINT8(c3) \ sl@0: ), \ sl@0: (TUint32)(sid) \ sl@0: } sl@0: sl@0: sl@0: /** Macro for compile-time definition of a security policy object sl@0: The policy will check for a secure ID and three capabilities. sl@0: sl@0: The object declared has an implicit conversion to const TSecurityPolicy&. sl@0: Taking the address of the object will return a const TSecurityPolicy*. sl@0: Explicit conversion to const TSecurityPolicy& may be effected by using the sl@0: function call operator n(). sl@0: sl@0: If an invlid capability value is specified then, dependant on the compiler, sl@0: a compile time error or warning be produced which includes the label sl@0: "__invalid_capability_value" sl@0: sl@0: @param n Name to use for policy object sl@0: @param sid The SID value to check for sl@0: @param c1 The first capability to check (enumerator of TCapability) sl@0: @param c2 The second capability to check (enumerator of TCapability) sl@0: @param c3 The third capability to check (enumerator of TCapability) sl@0: sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #define _LIT_SECURITY_POLICY_S3(n,sid,c1,c2,c3) \ sl@0: const TStaticSecurityPolicy n = _INIT_SECURITY_POLICY_S3(sid,c1,c2,c3) sl@0: sl@0: sl@0: /** Macro for compile-time initialisation of a security policy object sl@0: The policy will check for a secure ID and two capabilities. sl@0: sl@0: The object declared has an implicit conversion to const TSecurityPolicy&. sl@0: Taking the address of the object will return a const TSecurityPolicy*. sl@0: Explicit conversion to const TSecurityPolicy& may be effected by using the sl@0: function call operator n(). sl@0: sl@0: If an invlid capability value is specified then, dependant on the compiler, sl@0: a compile time error or warning be produced which includes the label sl@0: "__invalid_capability_value" sl@0: sl@0: @param sid The SID value to check for sl@0: @param c1 The first capability to check (enumerator of TCapability) sl@0: @param c2 The second capability to check (enumerator of TCapability) sl@0: sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #define _INIT_SECURITY_POLICY_S2(sid,c1,c2) \ sl@0: _INIT_SECURITY_POLICY_S3(sid,c1,c2,ECapability_None) sl@0: sl@0: sl@0: /** Macro for compile-time definition of a security policy object sl@0: The policy will check for a secure ID and two capabilities. sl@0: sl@0: The object declared has an implicit conversion to const TSecurityPolicy&. sl@0: Taking the address of the object will return a const TSecurityPolicy*. sl@0: Explicit conversion to const TSecurityPolicy& may be effected by using the sl@0: function call operator n(). sl@0: sl@0: If an invlid capability value is specified then, dependant on the compiler, sl@0: a compile time error or warning be produced which includes the label sl@0: "__invalid_capability_value" sl@0: sl@0: @param n Name to use for policy object sl@0: @param sid The SID value to check for sl@0: @param c1 The first capability to check (enumerator of TCapability) sl@0: @param c2 The second capability to check (enumerator of TCapability) sl@0: sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #define _LIT_SECURITY_POLICY_S2(n,sid,c1,c2) \ sl@0: _LIT_SECURITY_POLICY_S3(n,sid,c1,c2,ECapability_None) sl@0: sl@0: sl@0: /** Macro for compile-time initialisation of a security policy object sl@0: The policy will check for a secure ID and one capability. sl@0: sl@0: The object declared has an implicit conversion to const TSecurityPolicy&. sl@0: Taking the address of the object will return a const TSecurityPolicy*. sl@0: Explicit conversion to const TSecurityPolicy& may be effected by using the sl@0: function call operator n(). sl@0: sl@0: If an invlid capability value is specified then, dependant on the compiler, sl@0: a compile time error or warning be produced which includes the label sl@0: "__invalid_capability_value" sl@0: sl@0: @param sid The SID value to check for sl@0: @param c1 The first capability to check (enumerator of TCapability) sl@0: sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #define _INIT_SECURITY_POLICY_S1(sid,c1) \ sl@0: _INIT_SECURITY_POLICY_S3(sid,c1,ECapability_None,ECapability_None) sl@0: sl@0: sl@0: /** Macro for compile-time definition of a security policy object sl@0: The policy will check for a secure ID and one capability. sl@0: sl@0: The object declared has an implicit conversion to const TSecurityPolicy&. sl@0: Taking the address of the object will return a const TSecurityPolicy*. sl@0: Explicit conversion to const TSecurityPolicy& may be effected by using the sl@0: function call operator n(). sl@0: sl@0: If an invlid capability value is specified then, dependant on the compiler, sl@0: a compile time error or warning be produced which includes the label sl@0: "__invalid_capability_value" sl@0: sl@0: @param n Name to use for policy object sl@0: @param sid The SID value to check for sl@0: @param c1 The first capability to check (enumerator of TCapability) sl@0: sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #define _LIT_SECURITY_POLICY_S1(n,sid,c1) \ sl@0: _LIT_SECURITY_POLICY_S3(n,sid,c1,ECapability_None,ECapability_None) sl@0: sl@0: sl@0: /** Macro for compile-time initialisation of a security policy object sl@0: The policy will check for a secure ID. sl@0: sl@0: The object declared has an implicit conversion to const TSecurityPolicy&. sl@0: Taking the address of the object will return a const TSecurityPolicy*. sl@0: Explicit conversion to const TSecurityPolicy& may be effected by using the sl@0: function call operator n(). sl@0: sl@0: @param sid The SID value to check for sl@0: sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #define _INIT_SECURITY_POLICY_S0(sid) \ sl@0: _INIT_SECURITY_POLICY_S3(sid,ECapability_None,ECapability_None,ECapability_None) sl@0: sl@0: sl@0: /** Macro for compile-time definition of a security policy object sl@0: The policy will check for a secure ID. sl@0: sl@0: The object declared has an implicit conversion to const TSecurityPolicy&. sl@0: Taking the address of the object will return a const TSecurityPolicy*. sl@0: Explicit conversion to const TSecurityPolicy& may be effected by using the sl@0: function call operator n(). sl@0: sl@0: @param n Name to use for policy object sl@0: @param sid The SID value to check for sl@0: sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #define _LIT_SECURITY_POLICY_S0(n,sid) \ sl@0: _LIT_SECURITY_POLICY_S3(n,sid,ECapability_None,ECapability_None,ECapability_None) sl@0: sl@0: sl@0: /** Macro for compile-time initialisation of a security policy object sl@0: The policy will check for a vendor ID and three capabilities. sl@0: sl@0: The object declared has an implicit conversion to const TSecurityPolicy&. sl@0: Taking the address of the object will return a const TSecurityPolicy*. sl@0: Explicit conversion to const TSecurityPolicy& may be effected by using the sl@0: function call operator n(). sl@0: sl@0: If an invlid capability value is specified then, dependant on the compiler, sl@0: a compile time error or warning be produced which includes the label sl@0: "__invalid_capability_value" sl@0: sl@0: @param vid The VID value to check for sl@0: @param c1 The first capability to check (enumerator of TCapability) sl@0: @param c2 The second capability to check (enumerator of TCapability) sl@0: @param c3 The third capability to check (enumerator of TCapability) sl@0: sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #define _INIT_SECURITY_POLICY_V3(vid,c1,c2,c3) \ sl@0: { \ sl@0: FOUR_TUINT8( \ sl@0: (TUint8)TSecurityPolicy::ETypeV3, \ sl@0: CAPABILITY_AS_TUINT8(c1), \ sl@0: CAPABILITY_AS_TUINT8(c2), \ sl@0: CAPABILITY_AS_TUINT8(c3) \ sl@0: ), \ sl@0: (TUint32)(vid) \ sl@0: } sl@0: sl@0: sl@0: /** Macro for compile-time definition of a security policy object sl@0: The policy will check for a vendor ID and three capabilities. sl@0: sl@0: The object declared has an implicit conversion to const TSecurityPolicy&. sl@0: Taking the address of the object will return a const TSecurityPolicy*. sl@0: Explicit conversion to const TSecurityPolicy& may be effected by using the sl@0: function call operator n(). sl@0: sl@0: If an invlid capability value is specified then, dependant on the compiler, sl@0: a compile time error or warning be produced which includes the label sl@0: "__invalid_capability_value" sl@0: sl@0: @param n Name to use for policy object sl@0: @param vid The VID value to check for sl@0: @param c1 The first capability to check (enumerator of TCapability) sl@0: @param c2 The second capability to check (enumerator of TCapability) sl@0: @param c3 The third capability to check (enumerator of TCapability) sl@0: sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #define _LIT_SECURITY_POLICY_V3(n,vid,c1,c2,c3) \ sl@0: const TStaticSecurityPolicy n = _INIT_SECURITY_POLICY_V3(vid,c1,c2,c3) sl@0: sl@0: sl@0: /** Macro for compile-time initialisation of a security policy object sl@0: The policy will check for a vendor ID and two capabilities. sl@0: sl@0: The object declared has an implicit conversion to const TSecurityPolicy&. sl@0: Taking the address of the object will return a const TSecurityPolicy*. sl@0: Explicit conversion to const TSecurityPolicy& may be effected by using the sl@0: function call operator n(). sl@0: sl@0: If an invlid capability value is specified then, dependant on the compiler, sl@0: a compile time error or warning be produced which includes the label sl@0: "__invalid_capability_value" sl@0: sl@0: @param vid The VID value to check for sl@0: @param c1 The first capability to check (enumerator of TCapability) sl@0: @param c2 The second capability to check (enumerator of TCapability) sl@0: sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #define _INIT_SECURITY_POLICY_V2(vid,c1,c2) \ sl@0: _INIT_SECURITY_POLICY_V3(vid,c1,c2,ECapability_None) sl@0: sl@0: sl@0: /** Macro for compile-time definition of a security policy object sl@0: The policy will check for a vendor ID and two capabilities. sl@0: sl@0: The object declared has an implicit conversion to const TSecurityPolicy&. sl@0: Taking the address of the object will return a const TSecurityPolicy*. sl@0: Explicit conversion to const TSecurityPolicy& may be effected by using the sl@0: function call operator n(). sl@0: sl@0: If an invlid capability value is specified then, dependant on the compiler, sl@0: a compile time error or warning be produced which includes the label sl@0: "__invalid_capability_value" sl@0: sl@0: @param n Name to use for policy object sl@0: @param vid The VID value to check for sl@0: @param c1 The first capability to check (enumerator of TCapability) sl@0: @param c2 The second capability to check (enumerator of TCapability) sl@0: sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #define _LIT_SECURITY_POLICY_V2(n,vid,c1,c2) \ sl@0: _LIT_SECURITY_POLICY_V3(n,vid,c1,c2,ECapability_None) sl@0: sl@0: sl@0: /** Macro for compile-time initialisation of a security policy object sl@0: The policy will check for a vendor ID and one capability. sl@0: sl@0: The object declared has an implicit conversion to const TSecurityPolicy&. sl@0: Taking the address of the object will return a const TSecurityPolicy*. sl@0: Explicit conversion to const TSecurityPolicy& may be effected by using the sl@0: function call operator n(). sl@0: sl@0: If an invlid capability value is specified then, dependant on the compiler, sl@0: a compile time error or warning be produced which includes the label sl@0: "__invalid_capability_value" sl@0: sl@0: @param vid The VID value to check for sl@0: @param c1 The first capability to check (enumerator of TCapability) sl@0: sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #define _INIT_SECURITY_POLICY_V1(vid,c1) \ sl@0: _INIT_SECURITY_POLICY_V3(vid,c1,ECapability_None,ECapability_None) sl@0: sl@0: sl@0: /** Macro for compile-time definition of a security policy object sl@0: The policy will check for a vendor ID and one capability. sl@0: sl@0: The object declared has an implicit conversion to const TSecurityPolicy&. sl@0: Taking the address of the object will return a const TSecurityPolicy*. sl@0: Explicit conversion to const TSecurityPolicy& may be effected by using the sl@0: function call operator n(). sl@0: sl@0: If an invlid capability value is specified then, dependant on the compiler, sl@0: a compile time error or warning be produced which includes the label sl@0: "__invalid_capability_value" sl@0: sl@0: @param n Name to use for policy object sl@0: @param vid The VID value to check for sl@0: @param c1 The first capability to check (enumerator of TCapability) sl@0: sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #define _LIT_SECURITY_POLICY_V1(n,vid,c1) \ sl@0: _LIT_SECURITY_POLICY_V3(n,vid,c1,ECapability_None,ECapability_None) sl@0: sl@0: sl@0: /** Macro for compile-time initialisation of a security policy object sl@0: The policy will check for a vendor ID. sl@0: sl@0: The object declared has an implicit conversion to const TSecurityPolicy&. sl@0: Taking the address of the object will return a const TSecurityPolicy*. sl@0: Explicit conversion to const TSecurityPolicy& may be effected by using the sl@0: function call operator n(). sl@0: sl@0: @param vid The VID value to check for sl@0: sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #define _INIT_SECURITY_POLICY_V0(vid) \ sl@0: _INIT_SECURITY_POLICY_V3(vid,ECapability_None,ECapability_None,ECapability_None) sl@0: sl@0: sl@0: /** Macro for compile-time definition of a security policy object sl@0: The policy will check for a vendor ID. sl@0: sl@0: The object declared has an implicit conversion to const TSecurityPolicy&. sl@0: Taking the address of the object will return a const TSecurityPolicy*. sl@0: Explicit conversion to const TSecurityPolicy& may be effected by using the sl@0: function call operator n(). sl@0: sl@0: @param n Name to use for policy object sl@0: @param vid The VID value to check for sl@0: sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: #define _LIT_SECURITY_POLICY_V0(n,vid) \ sl@0: _LIT_SECURITY_POLICY_V3(n,vid,ECapability_None,ECapability_None,ECapability_None) sl@0: sl@0: sl@0: sl@0: #ifdef __KERNEL_MODE__ sl@0: class DThread; sl@0: class RMessageK; sl@0: #endif sl@0: class TPlatSecDiagnostic; sl@0: sl@0: /** sl@0: Class containing Platform Security related methods sl@0: @internalTechnology sl@0: */ sl@0: class PlatSec sl@0: { sl@0: #ifndef __KERNEL_MODE__ sl@0: public: sl@0: /** sl@0: Tests whether a given Platform Security capability is enforced by the system. sl@0: sl@0: Capabilities may not be enforced for several reasons: sl@0: -# The capability has been explicitly disabled on this system sl@0: by use of the PlatSecDisabledCaps configuration parameter sl@0: -# Platform Security checks have been globally disabled sl@0: by use of the EPlatSecEnforcement configuration parameter sl@0: -# The capability value is unknown. I.e. Is not part of the set of supported sl@0: capabilities. See TCapabilitySet::SetAllSupported(). sl@0: sl@0: @param aCapability The capability to test sl@0: @return A non-zero value if the capability is enforced, zero if it is not. sl@0: sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: IMPORT_C static TBool IsCapabilityEnforced(TCapability aCapability); sl@0: sl@0: /** sl@0: An enumeration used with PlatSecSetting() sl@0: @see PlatSecSetting() sl@0: @publishedAll sl@0: @test sl@0: */ sl@0: enum TConfigSetting sl@0: { sl@0: EPlatSecEnforcement, /**< Used to request the value of the PlatSecEnforcement setting */ sl@0: EPlatSecDiagnotics, /**< Used to request the value of the PlatSecDiagnotics setting */ sl@0: EPlatSecProcessIsolation, /**< Used to request the value of the PlatSecProcessIsolation setting */ sl@0: EPlatSecEnforceSysBin, /**< Used to request the value of the PlatSecEnforceSysBin setting */ sl@0: EPlatSecLocked, /**< Used to request the value of the PlatSecLocked setting */ sl@0: }; sl@0: sl@0: /** sl@0: A test function to return the state of a given Platform Security configuration setting. sl@0: @param aSetting An enumerated value representing the required setting sl@0: @return A value representing the setting. 0 represents 'OFF', 1 represents 'ON' sl@0: Other values may be returned for some settings, these exceptions are documented sl@0: in the description for individual enumerations of TConfigSetting. sl@0: @see TConfigSetting sl@0: @publishedAll sl@0: @test sl@0: */ sl@0: IMPORT_C static TInt ConfigSetting(TConfigSetting aSetting); sl@0: sl@0: #endif // Not __KERNEL_MODE__ sl@0: sl@0: // sl@0: // All methods below here are internalTechnology sl@0: // sl@0: sl@0: #ifndef __REMOVE_PLATSEC_DIAGNOSTICS__ sl@0: public: sl@0: /** @internalTechnology */ sl@0: static inline TInt LoaderCapabilityViolation(const TDesC8& aImporterName, const TDesC8& aFileName, const SCapabilitySet& aMissingCaps); sl@0: #ifdef __KERNEL_MODE__ sl@0: /** @internalTechnology */ sl@0: static inline TInt CapabilityCheckFail(const DProcess* aViolatingProcess, TCapability aCapability, const char* aContextText); sl@0: /** @internalTechnology */ sl@0: static inline TInt CapabilityCheckFail(const DThread* aViolatingThread, TCapability aCapability, const char* aContextText); sl@0: /** @internalTechnology */ sl@0: static inline TInt SecureIdCheckFail(const DProcess* aViolatingProcess, TSecureId aSid, const char* aContextText); sl@0: /** @internalTechnology */ sl@0: static inline TInt PolicyCheckFail(const DProcess* aProcess, const SSecurityInfo& aMissing, const char* aContextText); sl@0: /** @internalTechnology */ sl@0: static inline TInt PolicyCheckFail(const DThread* aProcess, const SSecurityInfo& aMissing, const char* aContextText); sl@0: /** @internalTechnology */ sl@0: static inline TInt ProcessIsolationFail(const char* aContextText); sl@0: /** @internalTechnology */ sl@0: static inline TInt ProcessIsolationIPCFail(RMessageK* aMessage, const char* aContextText); sl@0: #else // !__KERNEL_MODE__ sl@0: /** @internalTechnology */ sl@0: static inline TInt LoaderCapabilityViolation(RProcess aLoadingProcess, const TDesC8& aFileName, const SCapabilitySet& aMissingCaps); sl@0: /** @internalTechnology */ sl@0: static inline TInt CreatorCapabilityCheckFail(TCapability aCapability, const char* aContextText); sl@0: /** @internalTechnology */ sl@0: static inline TInt CreatorCapabilityCheckFail(const TCapabilitySet& aMissingCaps, const char* aContextText); sl@0: /** @internalTechnology */ sl@0: static inline TInt CapabilityCheckFail(TInt aHandle, TCapability aCapability, const char* aContextText); sl@0: /** @internalTechnology */ sl@0: static inline TInt CapabilityCheckFail(TInt aHandle, const TCapabilitySet& aMissingCaps, const char* aContextText); sl@0: /** @internalTechnology */ sl@0: static inline TInt PolicyCheckFail(TInt aHandle, const SSecurityInfo& aMissing, const char* aContextText); sl@0: /** @internalTechnology */ sl@0: static inline TInt CapabilityCheckFail(RMessagePtr2 aMessage, TCapability aCapability, const char* aContextText); sl@0: /** @internalTechnology */ sl@0: static inline TInt CapabilityCheckFail(RMessagePtr2 aMessage, const TCapabilitySet& aMissingCaps, const char* aContextText); sl@0: /** @internalTechnology */ sl@0: static inline TInt PolicyCheckFail(RMessagePtr2 aMessage, const SSecurityInfo& aMissingCaps, const char* aContextText); sl@0: /** @internalTechnology */ sl@0: static inline TInt PolicyCheckFail(RSessionBase aSession, const SSecurityInfo& aMissingCaps, const char* aContextText); sl@0: /** @internalTechnology */ sl@0: static inline TInt CreatorPolicyCheckFail(const SSecurityInfo& aMissingCaps, const char* aContextText); sl@0: /** @internalTechnology */ sl@0: static inline TInt CreatorCapabilityCheckFail(TCapability aCapability); sl@0: /** @internalTechnology */ sl@0: static inline TInt CreatorCapabilityCheckFail(const TCapabilitySet& aMissingCaps); sl@0: /** @internalTechnology */ sl@0: static inline TInt CapabilityCheckFail(TInt aHandle, TCapability aCapability); sl@0: /** @internalTechnology */ sl@0: static inline TInt CapabilityCheckFail(TInt aHandle, const TCapabilitySet& aMissingCaps); sl@0: /** @internalTechnology */ sl@0: static inline TInt PolicyCheckFail(TInt aHandle, const SSecurityInfo& aMissing); sl@0: /** @internalTechnology */ sl@0: static inline TInt CapabilityCheckFail(RMessagePtr2 aMessage, TCapability aCapability); sl@0: /** @internalTechnology */ sl@0: static inline TInt CapabilityCheckFail(RMessagePtr2 aMessage, const TCapabilitySet& aMissingCaps); sl@0: /** @internalTechnology */ sl@0: static inline TInt PolicyCheckFail(RMessagePtr2 aMessage, const SSecurityInfo& aMissingCaps); sl@0: /** @internalTechnology */ sl@0: static inline TInt CreatorPolicyCheckFail(const SSecurityInfo& aMissingCaps); sl@0: #endif //__KERNEL_MODE__ sl@0: sl@0: private: sl@0: UIMPORT_C static TInt EmitDiagnostic(TPlatSecDiagnostic& aDiagnostic, const char* aContextText); sl@0: #else //__REMOVE_PLATSEC_DIAGNOSTICS__ sl@0: #ifndef __KERNEL_MODE__ sl@0: private: sl@0: IMPORT_C static TInt EmitDiagnostic(TPlatSecDiagnostic& aDiagnostic, const char* aContextText); sl@0: #endif // !__KERNEL_MODE__ sl@0: #endif // !__REMOVE_PLATSEC_DIAGNOSTICS__ sl@0: sl@0: public: sl@0: /** @internalTechnology */ sl@0: UIMPORT_C static TInt EmitDiagnostic(); sl@0: }; sl@0: sl@0: sl@0: #define KMaxSerialNumLength 64 sl@0: typedef TBuf8 TMediaSerialNumber; sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Contains information about the code and data sections belonging to a process. sl@0: sl@0: @see RProcess::GetMemoryInfo sl@0: */ sl@0: class TProcessMemoryInfo sl@0: { sl@0: public: sl@0: /** sl@0: The code base address (.text). sl@0: */ sl@0: TUint32 iCodeBase; sl@0: sl@0: sl@0: /** sl@0: The size of the code section (.text). sl@0: */ sl@0: TUint32 iCodeSize; sl@0: sl@0: sl@0: /** sl@0: The base address of the constant data section (.radata). sl@0: */ sl@0: TUint32 iConstDataBase; sl@0: sl@0: sl@0: /** sl@0: The size of the constant data section (.radata). sl@0: */ sl@0: sl@0: TUint32 iConstDataSize; sl@0: sl@0: sl@0: /** sl@0: The base address of the initialised data section (.data). sl@0: */ sl@0: TUint32 iInitialisedDataBase; sl@0: sl@0: sl@0: /** sl@0: The size of the initialised data section (.data). sl@0: */ sl@0: TUint32 iInitialisedDataSize; sl@0: sl@0: sl@0: /** sl@0: The base address of the uninitialised data section (.bss). sl@0: */ sl@0: TUint32 iUninitialisedDataBase; sl@0: sl@0: sl@0: /** sl@0: The size of the uninitialised data section (.bss). sl@0: */ sl@0: TUint32 iUninitialisedDataSize; sl@0: }; sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Defines a more useful synonym for TProcessMemoryInfo. sl@0: */ sl@0: typedef TProcessMemoryInfo TModuleMemoryInfo; // more accurate name - remove old one later sl@0: sl@0: sl@0: sl@0: sl@0: #ifndef __KERNEL_MODE__ sl@0: class CBase; sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Generic array. sl@0: sl@0: This class defines a generic array which can be constructed by any of the sl@0: following templated concrete arrays: sl@0: sl@0: 1. CArrayFixFlat sl@0: sl@0: 2. CArrayFixSeg sl@0: sl@0: 3. CArrayVarFlat sl@0: sl@0: 4. CArrayVarSeg sl@0: sl@0: 5. CArrayPakFlat sl@0: sl@0: 6. RArray sl@0: sl@0: 7. RPointerArray sl@0: sl@0: and also by the following template specialisation classes: sl@0: sl@0: 1. RArray sl@0: sl@0: 2. RArray sl@0: sl@0: It allows a degree of polymorphism amongst the array classes. It permits the sl@0: operator[] and the Count() member functions of an array to be invoked without sl@0: knowing which array class has been used to construct that array. sl@0: sl@0: TArray allows access to elements of an array but does not permit changes to sl@0: those elements. sl@0: sl@0: Use the Array() member function of an array to construct and return sl@0: a TArray object for that array. sl@0: sl@0: A TArray type object is not intended to be constructed explicitly sl@0: by user code. sl@0: sl@0: @see CArrayFixFlat sl@0: @see CArrayFixSeg sl@0: @see CArrayVarFlat sl@0: @see CArrayVarSeg sl@0: @see CArrayPakFlat sl@0: @see RArray sl@0: @see RPointerArray sl@0: @see RArray sl@0: @see RArray sl@0: */ sl@0: template sl@0: class TArray sl@0: { sl@0: public: sl@0: inline TArray(TInt (*aCount)(const CBase* aPtr),const TAny*(*anAt)(const CBase* aPtr,TInt anIndex),const CBase* aPtr); sl@0: inline TInt Count() const; sl@0: inline const T& operator[](TInt anIndex) const; sl@0: private: sl@0: const CBase* iPtr; sl@0: TInt (*iCount)(const CBase* aPtr); sl@0: const TAny*(*iAt)(const CBase* aPtr,TInt anIndex); sl@0: }; sl@0: #endif sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Defines a function type used by a TIdentityRelation object. sl@0: sl@0: A function of this type implements an algorithm for determining whether sl@0: two objects match. sl@0: sl@0: @see TIdentityRelation sl@0: */ sl@0: typedef TBool (*TGeneralIdentityRelation)(const TAny*, const TAny*); sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Defines a function type used by a TLinearOrder object sl@0: sl@0: A function of this type implements an algorithm that determines sl@0: the order of two objects. sl@0: sl@0: @see TLinearOrder sl@0: */ sl@0: typedef TInt (*TGeneralLinearOrder)(const TAny*, const TAny*); sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: A templated class which packages a function that determines whether two sl@0: objects of a given class type match. During linear search operations the search sl@0: term is always passed as the first argument and the second argument is an sl@0: element of the array being searched. sl@0: sl@0: A TIdentityRelation object is constructed and passed as a parameter to sl@0: member functions of the array classes RArray and RPointerArray. sl@0: sl@0: @see RArray sl@0: @see RPointerArray sl@0: */ sl@0: template sl@0: class TIdentityRelation sl@0: { sl@0: public: sl@0: inline TIdentityRelation(); sl@0: inline TIdentityRelation( TBool (*anIdentity)(const T&, const T&) ); sl@0: inline operator TGeneralIdentityRelation() const; sl@0: private: sl@0: inline static TBool EqualityOperatorCompare(const T& aLeft, const T& aRight); sl@0: private: sl@0: TGeneralIdentityRelation iIdentity; sl@0: }; sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: A set of common identity relations for frequently occurring types. sl@0: sl@0: @see RArray sl@0: @see RPointerArray sl@0: @see RHashSet sl@0: @see RPtrHashSet sl@0: @see RHashMap sl@0: @see RPtrHashMap sl@0: */ sl@0: class DefaultIdentity sl@0: { sl@0: public: sl@0: IMPORT_C static TBool Integer(const TInt&, const TInt&); sl@0: IMPORT_C static TBool Des8(const TDesC8&, const TDesC8&); sl@0: IMPORT_C static TBool Des16(const TDesC16&, const TDesC16&); sl@0: IMPORT_C static TBool IntegerPtr(TInt* const&, TInt* const&); sl@0: IMPORT_C static TBool Des8Ptr(TDesC8* const&, TDesC8* const&); sl@0: IMPORT_C static TBool Des16Ptr(TDesC16* const&, TDesC16* const&); sl@0: }; sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: A templated class which packages a function that determines the order of two sl@0: objects of a given class type. During binary search operations the search term sl@0: is always passed as the first argument and the second argument is an element sl@0: of the array being searched. sl@0: sl@0: A TLinearOrder object is constructed and passed as a parameter to member sl@0: functions of the array classes RArray and RPointerArray. sl@0: sl@0: @see RArray sl@0: @see RPointerArray sl@0: */ sl@0: template sl@0: class TLinearOrder sl@0: { sl@0: public: sl@0: inline TLinearOrder( TInt(*anOrder)(const T&, const T&) ); sl@0: inline operator TGeneralLinearOrder() const; sl@0: private: sl@0: TGeneralLinearOrder iOrder; sl@0: }; sl@0: sl@0: sl@0: /* sl@0: @publishedAll sl@0: @released sl@0: sl@0: A set of values that tell array search functions which array element is to be sl@0: returned when there are duplicate elements in the array. sl@0: sl@0: These values are used by RArray, RPointerArray, RArray, sl@0: and RArray search functions. sl@0: sl@0: Examples of functions that take sl@0: these enum values are: RPointerArray::SpecificFindInOrderL(), sl@0: and RArray::SpecificFindInSignedKeyOrder(). sl@0: sl@0: @see RArray sl@0: @see RPointerArray sl@0: @see RArray sl@0: @see RArray sl@0: */ sl@0: enum TArrayFindMode sl@0: { sl@0: /** sl@0: Indicates that any element in a block of duplicate elements can be sl@0: returned by a search function. sl@0: sl@0: Note that using this mode, there can be no guarantee that the element sl@0: returned by the search functions will be the same if the size of the array sl@0: changes between successive calls to those functions. sl@0: */ sl@0: EArrayFindMode_Any = 0, sl@0: sl@0: /** sl@0: Indicates that the first element in a block of duplicate elements sl@0: is returned. sl@0: */ sl@0: EArrayFindMode_First = 1, sl@0: sl@0: /** sl@0: Indicates that the first element after the last element in a block sl@0: of duplicate elements is returned. sl@0: */ sl@0: EArrayFindMode_Last = 2, sl@0: sl@0: /** sl@0: @internalTechnology sl@0: */ sl@0: EArrayFindMode_Limit = 3 sl@0: }; sl@0: sl@0: sl@0: /** sl@0: @internalComponent sl@0: sl@0: Base class used in the derivation of RPointerArray, RArray, sl@0: and RArray. sl@0: sl@0: The base class is inherited privately. sl@0: sl@0: The class is internal and is not intended for use. sl@0: */ sl@0: class RPointerArrayBase sl@0: { sl@0: protected: sl@0: IMPORT_C RPointerArrayBase(); sl@0: IMPORT_C RPointerArrayBase(TInt aGranularity); sl@0: IMPORT_C RPointerArrayBase(TInt aMinGrowBy, TInt aFactor); sl@0: IMPORT_C void Close(); sl@0: IMPORT_C TInt Count() const; sl@0: inline void ZeroCount() {iCount=0;} sl@0: inline TAny** Entries() {return iEntries;} sl@0: IMPORT_C TAny*& At(TInt anIndex) const; sl@0: IMPORT_C TInt Append(const TAny* anEntry); sl@0: IMPORT_C TInt Insert(const TAny* anEntry, TInt aPos); sl@0: IMPORT_C void Remove(TInt anIndex); sl@0: IMPORT_C void Compress(); sl@0: IMPORT_C void Reset(); sl@0: IMPORT_C TInt Find(const TAny* anEntry) const; sl@0: IMPORT_C TInt Find(const TAny* anEntry, TGeneralIdentityRelation anIdentity) const; sl@0: IMPORT_C TInt FindReverse(const TAny* aEntry) const; sl@0: IMPORT_C TInt FindReverse(const TAny* aEntry, TGeneralIdentityRelation aIdentity) const; sl@0: IMPORT_C TInt FindIsqSigned(TInt anEntry) const; sl@0: IMPORT_C TInt FindIsqUnsigned(TUint anEntry) const; sl@0: IMPORT_C TInt FindIsq(const TAny* anEntry, TGeneralLinearOrder anOrder) const; sl@0: IMPORT_C TInt FindIsqSigned(TInt anEntry, TInt aMode) const; sl@0: IMPORT_C TInt FindIsqUnsigned(TUint anEntry, TInt aMode) const; sl@0: IMPORT_C TInt FindIsq(const TAny* anEntry, TGeneralLinearOrder anOrder, TInt aMode) const; sl@0: IMPORT_C TInt InsertIsqSigned(TInt anEntry, TBool aAllowRepeats); sl@0: IMPORT_C TInt InsertIsqUnsigned(TUint anEntry, TBool aAllowRepeats); sl@0: IMPORT_C TInt InsertIsq(const TAny* anEntry, TGeneralLinearOrder anOrder, TBool aAllowRepeats); sl@0: IMPORT_C TInt BinarySearchSigned(TInt anEntry, TInt& anIndex) const; sl@0: IMPORT_C TInt BinarySearchUnsigned(TUint anEntry, TInt& anIndex) const; sl@0: IMPORT_C TInt BinarySearch(const TAny* anEntry, TInt& anIndex, TGeneralLinearOrder anOrder) const; sl@0: IMPORT_C TInt BinarySearchSigned(TInt anEntry, TInt& anIndex, TInt aMode) const; sl@0: IMPORT_C TInt BinarySearchUnsigned(TUint anEntry, TInt& anIndex, TInt aMode) const; sl@0: IMPORT_C TInt BinarySearch(const TAny* anEntry, TInt& anIndex, TGeneralLinearOrder anOrder, TInt aMode) const; sl@0: #ifndef __KERNEL_MODE__ sl@0: IMPORT_C RPointerArrayBase(TAny** aEntries, TInt aCount); sl@0: IMPORT_C void GranularCompress(); sl@0: IMPORT_C TInt DoReserve(TInt aCount); sl@0: IMPORT_C void HeapSortSigned(); sl@0: IMPORT_C void HeapSortUnsigned(); sl@0: IMPORT_C void HeapSort(TGeneralLinearOrder anOrder); sl@0: IMPORT_C static TInt GetCount(const CBase* aPtr); sl@0: IMPORT_C static const TAny* GetElementPtr(const CBase* aPtr, TInt aIndex); sl@0: #endif sl@0: private: sl@0: TInt Grow(); sl@0: private: sl@0: TInt iCount; sl@0: TAny** iEntries; sl@0: TInt iAllocated; sl@0: TInt iGranularity; // positive means linear, negative means exponential growth sl@0: TInt iSpare1; sl@0: TInt iSpare2; sl@0: }; sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: A simple and efficient array of pointers to objects. sl@0: sl@0: The elements of the array are pointers to instances of a class; this class sl@0: is specified as the template parameter T. sl@0: sl@0: The class offers standard array behaviour which includes insertion, appending sl@0: and sorting of pointers. sl@0: sl@0: Derivation from RPointerArrayBase is private. sl@0: */ sl@0: template sl@0: class RPointerArray : private RPointerArrayBase sl@0: { sl@0: public: sl@0: inline RPointerArray(); sl@0: inline explicit RPointerArray(TInt aGranularity); sl@0: inline RPointerArray(TInt aMinGrowBy, TInt aFactor); sl@0: inline void Close(); sl@0: inline TInt Count() const; sl@0: inline T* const& operator[](TInt anIndex) const; sl@0: inline T*& operator[](TInt anIndex); sl@0: inline TInt Append(const T* anEntry); sl@0: inline TInt Insert(const T* anEntry, TInt aPos); sl@0: inline void Remove(TInt anIndex); sl@0: inline void Compress(); sl@0: inline void Reset(); sl@0: void ResetAndDestroy(); sl@0: inline TInt Find(const T* anEntry) const; sl@0: inline TInt Find(const T* anEntry, TIdentityRelation anIdentity) const; sl@0: template sl@0: inline TInt Find(const K& aKey, TBool (*apfnCompare)(const K* k, const T& t)) const sl@0: /** sl@0: Finds the first object pointer in the array which matches aKey using sl@0: the comparison algorithm provided by apfnCompare. sl@0: sl@0: The find operation always starts at the low index end of the array. There sl@0: is no assumption about the order of objects in the array. sl@0: sl@0: @param aKey The key of type K to be compared with the elements of the array using apfnCompare. sl@0: @param apfnCompare A function defining the identity relation between the sl@0: object pointers in the array, and their keys of type K. The sl@0: function returns true if k and t match based on this relationship. sl@0: sl@0: @return The index of the first matching object pointer within the array. sl@0: KErrNotFound, if no suitable object pointer can be found. sl@0: */ sl@0: { return RPointerArrayBase::Find((T*)&aKey,*(TIdentityRelation*)&apfnCompare); } sl@0: inline TInt FindReverse(const T* anEntry) const; sl@0: inline TInt FindReverse(const T* anEntry, TIdentityRelation anIdentity) const; sl@0: template sl@0: inline TInt FindReverse(const K& aKey, TInt (*apfnMatch)(const K* k, const T& t)) const sl@0: /** sl@0: Finds the first object pointer in the array which matches aKey using sl@0: the comparison algorithm provided by apfnCompare. sl@0: sl@0: The find operation always starts at the high index end of the array. There sl@0: is no assumption about the order of objects in the array. sl@0: sl@0: @param aKey The key of type K to be compared with the elements of the array using apfnMatch. sl@0: @param apfnMatch A function defining the identity relation between the sl@0: object pointers in the array, and their keys of type K. The sl@0: function returns true if k and t match based on this relationship. sl@0: sl@0: @return The index of the first matching object pointer within the array. sl@0: KErrNotFound, if no suitable object pointer can be found. sl@0: */ sl@0: sl@0: { return RPointerArrayBase::FindReverse((T*)&aKey,*(TIdentityRelation*)&apfnMatch); } sl@0: inline TInt FindInAddressOrder(const T* anEntry) const; sl@0: inline TInt FindInOrder(const T* anEntry, TLinearOrder anOrder) const; sl@0: inline TInt FindInAddressOrder(const T* anEntry, TInt& anIndex) const; sl@0: inline TInt FindInOrder(const T* anEntry, TInt& anIndex, TLinearOrder anOrder) const; sl@0: template sl@0: inline TInt FindInOrder(const K& aKey, TInt (*apfnCompare)(const K* k, const T& t)) const sl@0: /** sl@0: Finds the object pointer in the array whose object matches the specified sl@0: key, (Using the relationship defined within apfnCompare) using a binary search sl@0: technique and an ordering algorithm. sl@0: sl@0: The function assumes that existing object pointers in the array are ordered sl@0: so that the objects themselves are in object order as determined by an algorithm sl@0: supplied by the caller and packaged as a TLinearOrder. sl@0: sl@0: @param aKey The key of type K to be compared with the elements of the array using apfnCompare. sl@0: @param apfnCompare A function which defines the order that the array was sorted, sl@0: where in it aKey (via the defined relationship) should fit, and if the key is present. sl@0: sl@0: @return The index of the matching object pointer within the array. sl@0: KErrNotFound, if no suitable object pointer can be found. sl@0: */ sl@0: { return RPointerArrayBase::FindIsq((T*)&aKey,*(TLinearOrder*)&apfnCompare); } sl@0: inline TInt SpecificFindInAddressOrder(const T* anEntry, TInt aMode) const; sl@0: inline TInt SpecificFindInOrder(const T* anEntry, TLinearOrder anOrder, TInt aMode) const; sl@0: inline TInt SpecificFindInAddressOrder(const T* anEntry, TInt& anIndex, TInt aMode) const; sl@0: inline TInt SpecificFindInOrder(const T* anEntry, TInt& anIndex, TLinearOrder anOrder, TInt aMode) const; sl@0: inline TInt InsertInAddressOrder(const T* anEntry); sl@0: inline TInt InsertInOrder(const T* anEntry, TLinearOrder anOrder); sl@0: inline TInt InsertInAddressOrderAllowRepeats(const T* anEntry); sl@0: inline TInt InsertInOrderAllowRepeats(const T* anEntry, TLinearOrder anOrder); sl@0: #ifndef __KERNEL_MODE__ sl@0: inline void AppendL(const T* anEntry); sl@0: inline void InsertL(const T* anEntry, TInt aPos); sl@0: inline TInt FindL(const T* anEntry) const; sl@0: inline TInt FindL(const T* anEntry, TIdentityRelation anIdentity) const; sl@0: inline TInt FindReverseL(const T* anEntry) const; sl@0: inline TInt FindReverseL(const T* anEntry, TIdentityRelation anIdentity) const; sl@0: inline TInt FindInAddressOrderL(const T* anEntry) const; sl@0: inline TInt FindInOrderL(const T* anEntry, TLinearOrder anOrder) const; sl@0: inline void FindInAddressOrderL(const T* anEntry, TInt& anIndex) const; sl@0: inline void FindInOrderL(const T* anEntry, TInt& anIndex, TLinearOrder anOrder) const; sl@0: inline TInt SpecificFindInAddressOrderL(const T* anEntry, TInt aMode) const; sl@0: inline TInt SpecificFindInOrderL(const T* anEntry, TLinearOrder anOrder, TInt aMode) const; sl@0: inline void SpecificFindInAddressOrderL(const T* anEntry, TInt& anIndex, TInt aMode) const; sl@0: inline void SpecificFindInOrderL(const T* anEntry, TInt& anIndex, TLinearOrder anOrder, TInt aMode) const; sl@0: inline void InsertInAddressOrderL(const T* anEntry); sl@0: inline void InsertInOrderL(const T* anEntry, TLinearOrder anOrder); sl@0: inline void InsertInAddressOrderAllowRepeatsL(const T* anEntry); sl@0: inline void InsertInOrderAllowRepeatsL(const T* anEntry, TLinearOrder anOrder); sl@0: sl@0: inline RPointerArray(T** aEntries, TInt aCount); sl@0: inline void GranularCompress(); sl@0: inline TInt Reserve(TInt aCount); sl@0: inline void ReserveL(TInt aCount); sl@0: inline void SortIntoAddressOrder(); sl@0: inline void Sort(TLinearOrder anOrder); sl@0: inline TArray Array() const; sl@0: #endif sl@0: }; sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Array of raw pointers. sl@0: sl@0: The array is a simple and efficient specialized array of TAny pointers offering sl@0: standard array behaviour. sl@0: sl@0: The derivation from RPointerArrayBase is private. sl@0: */ sl@0: TEMPLATE_SPECIALIZATION class RPointerArray : private RPointerArrayBase sl@0: { sl@0: public: sl@0: inline RPointerArray(); sl@0: inline explicit RPointerArray(TInt aGranularity); sl@0: inline RPointerArray(TInt aMinGrowBy, TInt aFactor); sl@0: inline void Close(); sl@0: inline TInt Count() const; sl@0: inline TAny* const& operator[](TInt anIndex) const; sl@0: inline TAny*& operator[](TInt anIndex); sl@0: inline TInt Append(const TAny* anEntry); sl@0: inline TInt Insert(const TAny* anEntry, TInt aPos); sl@0: inline void Remove(TInt anIndex); sl@0: inline void Compress(); sl@0: inline void Reset(); sl@0: inline TInt Find(const TAny* anEntry) const; sl@0: inline TInt FindReverse(const TAny* anEntry) const; sl@0: inline TInt FindInAddressOrder(const TAny* anEntry) const; sl@0: inline TInt FindInAddressOrder(const TAny* anEntry, TInt& anIndex) const; sl@0: inline TInt SpecificFindInAddressOrder(const TAny* anEntry, TInt aMode) const; sl@0: inline TInt SpecificFindInAddressOrder(const TAny* anEntry, TInt& anIndex, TInt aMode) const; sl@0: inline TInt InsertInAddressOrder(const TAny* anEntry); sl@0: inline TInt InsertInAddressOrderAllowRepeats(const TAny* anEntry); sl@0: #ifndef __KERNEL_MODE__ sl@0: inline void AppendL(const TAny* anEntry); sl@0: inline void InsertL(const TAny* anEntry, TInt aPos); sl@0: inline TInt FindL(const TAny* anEntry) const; sl@0: inline TInt FindReverseL(const TAny* anEntry) const; sl@0: inline TInt FindInAddressOrderL(const TAny* anEntry) const; sl@0: inline void FindInAddressOrderL(const TAny* anEntry, TInt& anIndex) const; sl@0: inline TInt SpecificFindInAddressOrderL(const TAny* anEntry, TInt aMode) const; sl@0: inline void SpecificFindInAddressOrderL(const TAny* anEntry, TInt& anIndex, TInt aMode) const; sl@0: inline void InsertInAddressOrderL(const TAny* anEntry); sl@0: inline void InsertInAddressOrderAllowRepeatsL(const TAny* anEntry); sl@0: sl@0: inline RPointerArray(TAny** aEntries, TInt aCount); sl@0: inline void GranularCompress(); sl@0: inline void SortIntoAddressOrder(); sl@0: inline TArray Array() const; sl@0: #endif sl@0: }; sl@0: sl@0: sl@0: sl@0: /** sl@0: @internalComponent sl@0: sl@0: Base class used in the derivation of RArray. sl@0: sl@0: The base class is inherited privately. sl@0: sl@0: The class is internal and is not intended for use. sl@0: */ sl@0: class RArrayBase sl@0: { sl@0: protected: sl@0: IMPORT_C RArrayBase(TInt anEntrySize); sl@0: IMPORT_C RArrayBase(TInt anEntrySize, TInt aGranularity); sl@0: IMPORT_C RArrayBase(TInt anEntrySize, TInt aGranularity, TInt aKeyOffset); sl@0: IMPORT_C RArrayBase(TInt anEntrySize, TInt aMinGrowBy, TInt aKeyOffset, TInt aFactor); sl@0: IMPORT_C RArrayBase(TInt aEntrySize,TAny* aEntries, TInt aCount); sl@0: IMPORT_C void Close(); sl@0: IMPORT_C TInt Count() const; sl@0: IMPORT_C TAny* At(TInt anIndex) const; sl@0: IMPORT_C TInt Append(const TAny* anEntry); sl@0: IMPORT_C TInt Insert(const TAny* anEntry, TInt aPos); sl@0: IMPORT_C void Remove(TInt anIndex); sl@0: IMPORT_C void Compress(); sl@0: IMPORT_C void Reset(); sl@0: IMPORT_C TInt Find(const TAny* anEntry) const; sl@0: IMPORT_C TInt Find(const TAny* anEntry, TGeneralIdentityRelation anIdentity) const; sl@0: IMPORT_C TInt FindReverse(const TAny* aEntry) const; sl@0: IMPORT_C TInt FindReverse(const TAny* aEntry, TGeneralIdentityRelation aIdentity) const; sl@0: IMPORT_C TInt FindIsqSigned(const TAny* anEntry) const; sl@0: IMPORT_C TInt FindIsqUnsigned(const TAny* anEntry) const; sl@0: IMPORT_C TInt FindIsq(const TAny* anEntry, TGeneralLinearOrder anOrder) const; sl@0: IMPORT_C TInt FindIsqSigned(const TAny* anEntry, TInt aMode) const; sl@0: IMPORT_C TInt FindIsqUnsigned(const TAny* anEntry, TInt aMode) const; sl@0: IMPORT_C TInt FindIsq(const TAny* anEntry, TGeneralLinearOrder anOrder, TInt aMode) const; sl@0: IMPORT_C TInt InsertIsqSigned(const TAny* anEntry, TBool aAllowRepeats); sl@0: IMPORT_C TInt InsertIsqUnsigned(const TAny* anEntry, TBool aAllowRepeats); sl@0: IMPORT_C TInt InsertIsq(const TAny* anEntry, TGeneralLinearOrder anOrder, TBool aAllowRepeats); sl@0: IMPORT_C TInt BinarySearchSigned(const TAny* anEntry, TInt& anIndex) const; sl@0: IMPORT_C TInt BinarySearchUnsigned(const TAny* anEntry, TInt& anIndex) const; sl@0: IMPORT_C TInt BinarySearch(const TAny* anEntry, TInt& anIndex, TGeneralLinearOrder anOrder) const; sl@0: IMPORT_C TInt BinarySearchSigned(const TAny* anEntry, TInt& anIndex, TInt aMode) const; sl@0: IMPORT_C TInt BinarySearchUnsigned(const TAny* anEntry, TInt& anIndex, TInt aMode) const; sl@0: IMPORT_C TInt BinarySearch(const TAny* anEntry, TInt& anIndex, TGeneralLinearOrder anOrder, TInt aMode) const; sl@0: #ifndef __KERNEL_MODE__ sl@0: IMPORT_C void GranularCompress(); sl@0: IMPORT_C TInt DoReserve(TInt aCount); sl@0: IMPORT_C void HeapSortSigned(); sl@0: IMPORT_C void HeapSortUnsigned(); sl@0: IMPORT_C void HeapSort(TGeneralLinearOrder anOrder); sl@0: IMPORT_C static TInt GetCount(const CBase* aPtr); sl@0: IMPORT_C static const TAny* GetElementPtr(const CBase* aPtr, TInt aIndex); sl@0: #endif sl@0: private: sl@0: TInt Grow(); sl@0: private: sl@0: TInt iCount; sl@0: TAny* iEntries; sl@0: TInt iEntrySize; sl@0: TInt iKeyOffset; sl@0: TInt iAllocated; sl@0: TInt iGranularity; // positive means linear, negative means exponential growth sl@0: TInt iSpare1; sl@0: TInt iSpare2; sl@0: }; sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: A simple and efficient array of fixed length objects. sl@0: sl@0: The elements of the array are instances of a class; this class is specified sl@0: as the template parameter T. sl@0: sl@0: The array offers standard array behaviour which includes insertion, appending sl@0: and sorting of elements. sl@0: sl@0: Note: sl@0: sl@0: 1. where possible, this class should be used in preference to sl@0: CArrayFixFlat. sl@0: sl@0: 2. the derivation from RArrayBase is private. sl@0: sl@0: 3. for performance reasons, RArray stores objects in the array as sl@0: word (4 byte) aligned quantities. This means that some member functions sl@0: do not work when RArray is instantiated for classes of less than 4 bytes sl@0: in size, or when the class's alignment requirement is not 4. sl@0: Be aware that it is possible to get an unhandled exception on hardware sl@0: that enforces strict alignment. sl@0: sl@0: The affected functions are: sl@0: sl@0: 3.1 the constructor: RArray(TInt, T*, TInt) sl@0: sl@0: 3.2 Append(const T&) sl@0: sl@0: 3.3 Insert(const T&, TInt) sl@0: sl@0: 3.4 the [] operator, and then using the pointer to iterate through sl@0: the array as you would with a C array. sl@0: */ sl@0: template sl@0: class RArray : private RArrayBase sl@0: { sl@0: public: sl@0: inline RArray(); sl@0: inline explicit RArray(TInt aGranularity); sl@0: inline RArray(TInt aGranularity, TInt aKeyOffset); sl@0: inline RArray(TInt aMinGrowBy, TInt aKeyOffset, TInt aFactor); sl@0: inline RArray(TInt aEntrySize,T* aEntries, TInt aCount); sl@0: inline void Close(); sl@0: inline TInt Count() const; sl@0: inline const T& operator[](TInt anIndex) const; sl@0: inline T& operator[](TInt anIndex); sl@0: inline TInt Append(const T& anEntry); sl@0: inline TInt Insert(const T& anEntry, TInt aPos); sl@0: inline void Remove(TInt anIndex); sl@0: inline void Compress(); sl@0: inline void Reset(); sl@0: inline TInt Find(const T& anEntry) const; sl@0: inline TInt Find(const T& anEntry, TIdentityRelation anIdentity) const; sl@0: template sl@0: inline TInt Find(const K& aKey, TBool (*apfnCompare)(const K* k, const T& t)) const sl@0: /** sl@0: Finds the first object in the array which matches aKey using sl@0: the comparison algorithm provided by apfnCompare. sl@0: sl@0: The find operation always starts at the low index end of the array. There sl@0: is no assumption about the order of objects in the array. sl@0: sl@0: @param aKey The key of type K to be compared with the elements of the array using apfnCompare. sl@0: @param apfnCompare A function defining the identity relation between the sl@0: object in the array, and their keys of type K. The function sl@0: returns true if k and t match based on this relationship. sl@0: sl@0: @return The index of the first matching object within the array. sl@0: KErrNotFound, if no suitable object can be found. sl@0: */ sl@0: { return RArrayBase::Find((T*)&aKey,*(TIdentityRelation*)&apfnCompare); } sl@0: inline TInt FindReverse(const T& anEntry) const; sl@0: inline TInt FindReverse(const T& anEntry, TIdentityRelation anIdentity) const; sl@0: template sl@0: inline TInt FindReverse(const K& aKey, TInt (*apfnMatch)(const K* k, const T& t)) const sl@0: /** sl@0: Finds the first object in the array which matches aKey using the comparison sl@0: algorithm provided by apfnCompare. sl@0: sl@0: The find operation always starts at the high index end of the array. There sl@0: is no assumption about the order of objects in the array. sl@0: sl@0: @param aKey The key of type K to be compared with the elements of the array using apfnMatch. sl@0: @param apfnMatch A function defining the identity relation between the sl@0: object in the array, and their keys of type K. The function sl@0: returns true if k and t match based on this relationship. sl@0: sl@0: @return The index of the first matching object within the array. sl@0: KErrNotFound, if no suitable object can be found. sl@0: */ sl@0: { return RArrayBase::FindReverse((T*)&aKey,*(TIdentityRelation*)&apfnMatch); } sl@0: inline TInt FindInSignedKeyOrder(const T& anEntry) const; sl@0: inline TInt FindInUnsignedKeyOrder(const T& anEntry) const; sl@0: inline TInt FindInOrder(const T& anEntry, TLinearOrder anOrder) const; sl@0: inline TInt FindInSignedKeyOrder(const T& anEntry, TInt& anIndex) const; sl@0: inline TInt FindInUnsignedKeyOrder(const T& anEntry, TInt& anIndex) const; sl@0: inline TInt FindInOrder(const T& anEntry, TInt& anIndex, TLinearOrder anOrder) const; sl@0: template sl@0: inline TInt FindInOrder(const K& aKey, TInt (*apfnCompare)(const K* k, const T& t)) const sl@0: /** sl@0: Finds the object in the array whose object matches the specified sl@0: key, (Using the relationship defined within apfnCompare) using a binary search sl@0: technique and an ordering algorithm. sl@0: sl@0: The function assumes that existing objects in the array are ordered so sl@0: that the objects themselves are in object order as determined by an algorithm sl@0: supplied by the caller and packaged as a TLinearOrder. sl@0: sl@0: @param aKey The key of type K to be compared with the elements of the array using apfnCompare. sl@0: @param apfnCompare A function which defines the order that the array was sorted, sl@0: where in it aKey (via the defined relationship) should fit, and if the key is present. sl@0: sl@0: @return The index of the matching object within the array. sl@0: KErrNotFound, if no suitable object can be found. sl@0: */ sl@0: sl@0: { return RArrayBase::FindIsq((T*)&aKey,*(TLinearOrder*)&apfnCompare); } sl@0: inline TInt SpecificFindInSignedKeyOrder(const T& anEntry, TInt aMode) const; sl@0: inline TInt SpecificFindInUnsignedKeyOrder(const T& anEntry, TInt aMode) const; sl@0: inline TInt SpecificFindInOrder(const T& anEntry, TLinearOrder anOrder, TInt aMode) const; sl@0: inline TInt SpecificFindInSignedKeyOrder(const T& anEntry, TInt& anIndex, TInt aMode) const; sl@0: inline TInt SpecificFindInUnsignedKeyOrder(const T& anEntry, TInt& anIndex, TInt aMode) const; sl@0: inline TInt SpecificFindInOrder(const T& anEntry, TInt& anIndex, TLinearOrder anOrder, TInt aMode) const; sl@0: inline TInt InsertInSignedKeyOrder(const T& anEntry); sl@0: inline TInt InsertInUnsignedKeyOrder(const T& anEntry); sl@0: inline TInt InsertInOrder(const T& anEntry, TLinearOrder anOrder); sl@0: inline TInt InsertInSignedKeyOrderAllowRepeats(const T& anEntry); sl@0: inline TInt InsertInUnsignedKeyOrderAllowRepeats(const T& anEntry); sl@0: inline TInt InsertInOrderAllowRepeats(const T& anEntry, TLinearOrder anOrder); sl@0: #ifndef __KERNEL_MODE__ sl@0: inline void AppendL(const T& anEntry); sl@0: inline void InsertL(const T& anEntry, TInt aPos); sl@0: inline TInt FindL(const T& anEntry) const; sl@0: inline TInt FindL(const T& anEntry, TIdentityRelation anIdentity) const; sl@0: inline TInt FindReverseL(const T& anEntry) const; sl@0: inline TInt FindReverseL(const T& anEntry, TIdentityRelation anIdentity) const; sl@0: inline TInt FindInSignedKeyOrderL(const T& anEntry) const; sl@0: inline TInt FindInUnsignedKeyOrderL(const T& anEntry) const; sl@0: inline TInt FindInOrderL(const T& anEntry, TLinearOrder anOrder) const; sl@0: inline void FindInSignedKeyOrderL(const T& anEntry, TInt& anIndex) const; sl@0: inline void FindInUnsignedKeyOrderL(const T& anEntry, TInt& anIndex) const; sl@0: inline void FindInOrderL(const T& anEntry, TInt& anIndex, TLinearOrder anOrder) const; sl@0: inline TInt SpecificFindInSignedKeyOrderL(const T& anEntry, TInt aMode) const; sl@0: inline TInt SpecificFindInUnsignedKeyOrderL(const T& anEntry, TInt aMode) const; sl@0: inline TInt SpecificFindInOrderL(const T& anEntry, TLinearOrder anOrder, TInt aMode) const; sl@0: inline void SpecificFindInSignedKeyOrderL(const T& anEntry, TInt& anIndex, TInt aMode) const; sl@0: inline void SpecificFindInUnsignedKeyOrderL(const T& anEntry, TInt& anIndex, TInt aMode) const; sl@0: inline void SpecificFindInOrderL(const T& anEntry, TInt& anIndex, TLinearOrder anOrder, TInt aMode) const; sl@0: inline void InsertInSignedKeyOrderL(const T& anEntry); sl@0: inline void InsertInUnsignedKeyOrderL(const T& anEntry); sl@0: inline void InsertInOrderL(const T& anEntry, TLinearOrder anOrder); sl@0: inline void InsertInSignedKeyOrderAllowRepeatsL(const T& anEntry); sl@0: inline void InsertInUnsignedKeyOrderAllowRepeatsL(const T& anEntry); sl@0: inline void InsertInOrderAllowRepeatsL(const T& anEntry, TLinearOrder anOrder); sl@0: sl@0: inline void GranularCompress(); sl@0: inline TInt Reserve(TInt aCount); sl@0: inline void ReserveL(TInt aCount); sl@0: inline void SortSigned(); sl@0: inline void SortUnsigned(); sl@0: inline void Sort(TLinearOrder anOrder); sl@0: inline TArray Array() const; sl@0: #endif sl@0: }; sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: A simple and efficient specialized array of signed integers offering standard sl@0: array behaviour. sl@0: sl@0: Note that derivation from RPointerArrayBase is private. sl@0: */ sl@0: TEMPLATE_SPECIALIZATION class RArray : private RPointerArrayBase sl@0: { sl@0: public: sl@0: inline RArray(); sl@0: inline explicit RArray(TInt aGranularity); sl@0: inline RArray(TInt aMinGrowBy, TInt aFactor); sl@0: inline void Close(); sl@0: inline TInt Count() const; sl@0: inline const TInt& operator[](TInt anIndex) const; sl@0: inline TInt& operator[](TInt anIndex); sl@0: inline TInt Append(TInt anEntry); sl@0: inline TInt Insert(TInt anEntry, TInt aPos); sl@0: inline void Remove(TInt anIndex); sl@0: inline void Compress(); sl@0: inline void Reset(); sl@0: inline TInt Find(TInt anEntry) const; sl@0: inline TInt FindReverse(TInt anEntry) const; sl@0: inline TInt FindInOrder(TInt anEntry) const; sl@0: inline TInt FindInOrder(TInt anEntry, TInt& anIndex) const; sl@0: inline TInt SpecificFindInOrder(TInt anEntry, TInt aMode) const; sl@0: inline TInt SpecificFindInOrder(TInt anEntry, TInt& anIndex, TInt aMode) const; sl@0: inline TInt InsertInOrder(TInt anEntry); sl@0: inline TInt InsertInOrderAllowRepeats(TInt anEntry); sl@0: #ifndef __KERNEL_MODE__ sl@0: inline void AppendL(TInt anEntry); sl@0: inline void InsertL(TInt anEntry, TInt aPos); sl@0: inline TInt FindL(TInt anEntry) const; sl@0: inline TInt FindReverseL(TInt anEntry) const; sl@0: inline TInt FindInOrderL(TInt anEntry) const; sl@0: inline void FindInOrderL(TInt anEntry, TInt& anIndex) const; sl@0: inline TInt SpecificFindInOrderL(TInt anEntry, TInt aMode) const; sl@0: inline void SpecificFindInOrderL(TInt anEntry, TInt& anIndex, TInt aMode) const; sl@0: inline void InsertInOrderL(TInt anEntry); sl@0: inline void InsertInOrderAllowRepeatsL(TInt anEntry); sl@0: sl@0: inline RArray(TInt* aEntries, TInt aCount); sl@0: inline void GranularCompress(); sl@0: inline TInt Reserve(TInt aCount); sl@0: inline void ReserveL(TInt aCount); sl@0: inline void Sort(); sl@0: inline TArray Array() const; sl@0: #endif sl@0: }; sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Array of unsigned integers. sl@0: sl@0: The array is a simple and efficient specialized array of unsigned integers sl@0: offering standard array behaviour. sl@0: sl@0: The derivation from RPointerArrayBase is private. sl@0: */ sl@0: TEMPLATE_SPECIALIZATION class RArray : private RPointerArrayBase sl@0: { sl@0: public: sl@0: inline RArray(); sl@0: inline explicit RArray(TInt aGranularity); sl@0: inline RArray(TInt aMinGrowBy, TInt aFactor); sl@0: inline void Close(); sl@0: inline TInt Count() const; sl@0: inline const TUint& operator[](TInt anIndex) const; sl@0: inline TUint& operator[](TInt anIndex); sl@0: inline TInt Append(TUint anEntry); sl@0: inline TInt Insert(TUint anEntry, TInt aPos); sl@0: inline void Remove(TInt anIndex); sl@0: inline void Compress(); sl@0: inline void Reset(); sl@0: inline TInt Find(TUint anEntry) const; sl@0: inline TInt FindReverse(TUint anEntry) const; sl@0: inline TInt FindInOrder(TUint anEntry) const; sl@0: inline TInt FindInOrder(TUint anEntry, TInt& anIndex) const; sl@0: inline TInt SpecificFindInOrder(TUint anEntry, TInt aMode) const; sl@0: inline TInt SpecificFindInOrder(TUint anEntry, TInt& anIndex, TInt aMode) const; sl@0: inline TInt InsertInOrder(TUint anEntry); sl@0: inline TInt InsertInOrderAllowRepeats(TUint anEntry); sl@0: #ifndef __KERNEL_MODE__ sl@0: inline void AppendL(TUint anEntry); sl@0: inline void InsertL(TUint anEntry, TInt aPos); sl@0: inline TInt FindL(TUint anEntry) const; sl@0: inline TInt FindReverseL(TUint anEntry) const; sl@0: inline TInt FindInOrderL(TUint anEntry) const; sl@0: inline void FindInOrderL(TUint anEntry, TInt& anIndex) const; sl@0: inline TInt SpecificFindInOrderL(TUint anEntry, TInt aMode) const; sl@0: inline void SpecificFindInOrderL(TUint anEntry, TInt& anIndex, TInt aMode) const; sl@0: inline void InsertInOrderL(TUint anEntry); sl@0: inline void InsertInOrderAllowRepeatsL(TUint anEntry); sl@0: sl@0: inline RArray(TUint* aEntries, TInt aCount); sl@0: inline void GranularCompress(); sl@0: inline TInt Reserve(TInt aCount); sl@0: inline void ReserveL(TInt aCount); sl@0: inline void Sort(); sl@0: inline TArray Array() const; sl@0: #endif sl@0: }; sl@0: sl@0: #ifndef __LEAVE_EQUALS_THROW__ sl@0: sl@0: class TTrapHandler; sl@0: sl@0: /** sl@0: @internalComponent sl@0: */ sl@0: class TTrap sl@0: { sl@0: public: sl@0: #ifndef __KERNEL_MODE__ sl@0: IMPORT_C TInt Trap(TInt& aResult); sl@0: IMPORT_C static void UnTrap(); sl@0: #endif sl@0: public: sl@0: enum {EMaxState=0x10}; sl@0: public: sl@0: TInt iState[EMaxState]; sl@0: TTrap* iNext; sl@0: TInt* iResult; sl@0: TTrapHandler* iHandler; sl@0: }; sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Executes the set of C++ statements _s under a trap harness. sl@0: sl@0: Use this macro as a C++ statement. sl@0: sl@0: _r must be a TInt which has already been declared; if any of the sl@0: C++ statements _s leaves, then the leave code is returned in _r, sl@0: otherwise _r is set to KErrNone. sl@0: sl@0: _s can consist of multiple C++ statements; in theory, _s can consist sl@0: of any legal C++ code but in practice, such statements consist of simple sl@0: function calls, e.g. Foo() or an assignment of some value to the result of sl@0: a function call, e.g. functionValue=GetFoo(). sl@0: sl@0: A cleanup stack is constructed for the set of C++ statements _s. sl@0: If any function in _s leaves, objects pushed to the cleanup stack are sl@0: cleaned-up. In addition, if any of the C++ statements in _s leaves, sl@0: then remaining C++ code in _s is not executed and any variables which sl@0: are assigned within that remaining code are not defined. sl@0: sl@0: @param _r An lvalue, convertible to TInt&, which will receive the result of sl@0: any User::Leave() executed within _s or, if no leave occurred, sl@0: it will be set to KErrNone. The value of _r on entry is not used. sl@0: sl@0: @param _s C++ statements which will be executed under a trap harness. sl@0: sl@0: @see TRAPD sl@0: */ sl@0: #define TRAP(_r,_s) {TTrap __t;if (__t.Trap(_r)==0){_s;TTrap::UnTrap();}} sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Executes the set of C++ statements _s under a trap harness. sl@0: sl@0: Use this macro in the same way as you would TRAP, except that the sl@0: variable _r is defined as part of the macro (and is therefore valid for the sl@0: rest of the block in which the macro occurs). Often, this saves a line of code. sl@0: sl@0: @param _r A name, which will be declared as a TInt, and will receive the result sl@0: of any User::Leave() executed within _s or, if no leave occurred, it sl@0: will be set to KErrNone. After the macro, _r remains in scope until sl@0: the end of its enclosing block. sl@0: sl@0: @param _s C++ statements which will be executed under a trap harness. sl@0: sl@0: @see TRAP sl@0: */ sl@0: #define TRAPD(_r,_s) TInt _r;{TTrap __t;if (__t.Trap(_r)==0){_s;TTrap::UnTrap();}} sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Executes the set of C++ statements _s under a trap harness. sl@0: Any leave code generated is ignored. sl@0: sl@0: Use this macro as a C++ statement. sl@0: sl@0: This macro is functionally equivalent to: sl@0: @code sl@0: TInt x; sl@0: TRAP(x,_s) sl@0: @endcode sl@0: or sl@0: @code sl@0: TRAPD(x,_s) sl@0: @endcode sl@0: where the value in 'x' is not used by any subsequent code. sl@0: sl@0: _s can consist of multiple C++ statements; in theory, _s can consist sl@0: of any legal C++ code but in practice, such statements consist of simple sl@0: function calls, e.g. Foo() or an assignment of some value to the result of sl@0: a function call, e.g. functionValue=GetFoo(). sl@0: sl@0: A cleanup stack is constructed for the set of C++ statements _s. sl@0: If any function in _s leaves, objects pushed to the cleanup stack are sl@0: cleaned-up. In addition, if any of the C++ statements in _s leaves, sl@0: then remaining C++ code in _s is not executed and any variables which sl@0: are assigned within that remaining code are not defined. sl@0: sl@0: @param _s C++ statements which will be executed under a trap harness. sl@0: sl@0: @see TRAPD sl@0: @see TRAP sl@0: */ sl@0: #define TRAP_IGNORE(_s) {TInt _ignore;TTrap __t;if (__t.Trap(_ignore)==0){_s;TTrap::UnTrap();}} sl@0: sl@0: sl@0: #else //__LEAVE_EQUALS_THROW__ sl@0: sl@0: #if defined(__WINS__) && !defined(__SYMC__) sl@0: /** @internalComponent */ sl@0: #define __WIN32SEHTRAP TWin32SEHTrap __trap; __trap.Trap(); sl@0: /** @internalComponent */ sl@0: #define __WIN32SEHUNTRAP __trap.UnTrap(); sl@0: IMPORT_C void EmptyFunction(); sl@0: #define __CALL_EMPTY_FUNCTION EmptyFunction(); sl@0: #else // !__WINS__ sl@0: #define __WIN32SEHTRAP sl@0: #define __WIN32SEHUNTRAP sl@0: #define __CALL_EMPTY_FUNCTION sl@0: #endif //__WINS__ sl@0: sl@0: /** sl@0: This macro is used by the TRAP and TRAPD macros and provides a means sl@0: of inserting code into uses of these. sl@0: sl@0: This macro is invoked before any 'trapped' code is called, and it should be sl@0: redefined to do whatever task is required. E.g. this code: sl@0: sl@0: @code sl@0: #undef TRAP_INSTRUMENTATION_START sl@0: #define TRAP_INSTRUMENTATION_START DoMyLoging(__LINE__) sl@0: @endcode sl@0: sl@0: Will cause all subsequent uses of the TRAP macros to behave in an sl@0: equivalent way to: sl@0: sl@0: @code sl@0: DoMyLoging(__LINE__) sl@0: TRAP(r,SomeCodeL()); sl@0: @endcode sl@0: sl@0: sl@0: @publishedPartner sl@0: @released sl@0: sl@0: @see TRAP sl@0: @see TRAPD sl@0: */ sl@0: #define TRAP_INSTRUMENTATION_START sl@0: sl@0: sl@0: sl@0: /** sl@0: This macro is used by the TRAP and TRAPD macros and provides a means sl@0: of inserting code into uses of these. sl@0: sl@0: This macro is invoked if the 'trapped' code did not Leave. sl@0: E.g. this code: sl@0: sl@0: @code sl@0: #undef TRAP_INSTRUMENTATION_NOLEAVE sl@0: #define TRAP_INSTRUMENTATION_NOLEAVE DoMyLoging(__LINE__) sl@0: @endcode sl@0: sl@0: Will cause all subsequent uses of the TRAP macros to behave in an sl@0: equivalent way to: sl@0: sl@0: @code sl@0: TRAP(r,SomeCodeL()); sl@0: if(r==KErrNone) DoMyLoging(__LINE__); sl@0: @endcode sl@0: sl@0: sl@0: @param aLine The line number in the C++ source file where the TRAP or TRAPD sl@0: macro was used. sl@0: sl@0: @publishedPartner sl@0: @released sl@0: sl@0: @see TRAP sl@0: @see TRAPD sl@0: */ sl@0: #define TRAP_INSTRUMENTATION_NOLEAVE sl@0: sl@0: sl@0: /** sl@0: This macro is used by the TRAP and TRAPD macros and provides a means sl@0: of inserting code into uses of these. sl@0: sl@0: This macro is invoked if the 'trapped' code did Leave. E.g. this code: sl@0: sl@0: @code sl@0: #undef TRAP_INSTRUMENTATION_LEAVE sl@0: #define TRAP_INSTRUMENTATION_LEAVE(aResult) DoMyLoging(aResult,__LINE__) sl@0: @endcode sl@0: sl@0: Will cause all subsequent uses of the TRAP macros to behave in an sl@0: equivalent way to: sl@0: sl@0: @code sl@0: TRAP(r,SomeCodeL()); sl@0: if(r!=KErrNone) DoMyLoging(r,__LINE__); sl@0: @endcode sl@0: sl@0: sl@0: @param aResult A reference to the result value used in the TRAP macro. sl@0: sl@0: sl@0: @publishedPartner sl@0: @released sl@0: sl@0: @see TRAP sl@0: @see TRAPD sl@0: */ sl@0: #define TRAP_INSTRUMENTATION_LEAVE(aResult) sl@0: sl@0: sl@0: sl@0: /** sl@0: This macro is used by the TRAP and TRAPD macros and provides a means sl@0: of inserting code into uses of these. sl@0: sl@0: This macro is invoked after the 'trapped' code is called, regardless of whether sl@0: or not it did Leave. It should be redefined to do whatever task is sl@0: required. E.g. this code: sl@0: sl@0: @code sl@0: #undef TRAP_INSTRUMENTATION_END sl@0: #define TRAP_INSTRUMENTATION_END DoMyLoging(__LINE__) sl@0: @endcode sl@0: sl@0: Will cause all subsequent uses of the TRAP macros to behave in an sl@0: equivalent way to: sl@0: sl@0: @code sl@0: TRAP(r,SomeCodeL()); sl@0: DoMyLoging(__LINE__) sl@0: @endcode sl@0: sl@0: sl@0: @publishedPartner sl@0: @released sl@0: sl@0: @see TRAP sl@0: @see TRAPD sl@0: */ sl@0: #define TRAP_INSTRUMENTATION_END sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Executes the set of C++ statements _s under a trap harness. sl@0: sl@0: Use this macro as a C++ statement. sl@0: sl@0: _r must be a TInt which has already been declared; if any of the sl@0: C++ statements _s leaves, then the leave code is returned in _r, sl@0: otherwise _r is set to KErrNone. sl@0: sl@0: _s can consist of multiple C++ statements; in theory, _s can consist sl@0: of any legal C++ code but in practice, such statements consist of simple sl@0: function calls, e.g. Foo() or an assignment of some value to the result of sl@0: a function call, e.g. functionValue=GetFoo(). sl@0: sl@0: A cleanup stack is constructed for the set of C++ statements _s. sl@0: If any function in _s leaves, objects pushed to the cleanup stack are sl@0: cleaned-up. In addition, if any of the C++ statements in _s leaves, sl@0: then remaining C++ code in _s is not executed and any variables which sl@0: are assigned within that remaining code are not defined. sl@0: sl@0: @param _r An lvalue, convertible to TInt&, which will receive the result of sl@0: any User::Leave() executed within _s or, if no leave occurred, sl@0: it will be set to KErrNone. The value of _r on entry is not used. sl@0: sl@0: @param _s C++ statements which will be executed under a trap harness. sl@0: sl@0: @see TRAPD sl@0: */ sl@0: sl@0: /*__CALL_EMPTY_FUNCTION(call to a function with an empty body) was added as a sl@0: workaround to a compiler bug (mwccsym2 - winscw ) which caused an incorrect sl@0: trap handler to be invoked when multiple nested TRAP's were present and sl@0: User::Leave(..) was called. */ sl@0: sl@0: #define TRAP(_r, _s) \ sl@0: { \ sl@0: TInt& __rref = _r; \ sl@0: __rref = 0; \ sl@0: { TRAP_INSTRUMENTATION_START; } \ sl@0: try { \ sl@0: __WIN32SEHTRAP \ sl@0: TTrapHandler* ____t = User::MarkCleanupStack(); \ sl@0: _s; \ sl@0: User::UnMarkCleanupStack(____t); \ sl@0: { TRAP_INSTRUMENTATION_NOLEAVE; } \ sl@0: __WIN32SEHUNTRAP \ sl@0: } \ sl@0: catch (XLeaveException& l) \ sl@0: { \ sl@0: __rref = l.GetReason(); \ sl@0: { TRAP_INSTRUMENTATION_LEAVE(__rref); } \ sl@0: } \ sl@0: catch (...) \ sl@0: { \ sl@0: User::Invariant(); \ sl@0: } \ sl@0: __CALL_EMPTY_FUNCTION \ sl@0: { TRAP_INSTRUMENTATION_END; } \ sl@0: } sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Executes the set of C++ statements _s under a trap harness. sl@0: sl@0: Use this macro in the same way as you would TRAP, except that the sl@0: variable _r is defined as part of the macro (and is therefore valid for the sl@0: rest of the block in which the macro occurs). Often, this saves a line of code. sl@0: sl@0: @param _r A name, which will be declared as a TInt, and will receive the result sl@0: of any User::Leave() executed within _s or, if no leave occurred, it sl@0: will be set to KErrNone. After the macro, _r remains in scope until sl@0: the end of its enclosing block. sl@0: sl@0: @param _s C++ statements which will be executed under a trap harness. sl@0: sl@0: @see TRAP sl@0: */ sl@0: sl@0: /*__CALL_EMPTY_FUNCTION(call to a function with an empty body) was added as a sl@0: workaround to a compiler bug (mwccsym2 - winscw ) which caused an incorrect sl@0: trap handler to be invoked when multiple nested TRAP's were present and sl@0: User::Leave(..) was called. */ sl@0: sl@0: sl@0: #define TRAPD(_r, _s) \ sl@0: TInt _r; \ sl@0: { \ sl@0: _r = 0; \ sl@0: { TRAP_INSTRUMENTATION_START; } \ sl@0: try { \ sl@0: __WIN32SEHTRAP \ sl@0: TTrapHandler* ____t = User::MarkCleanupStack(); \ sl@0: _s; \ sl@0: User::UnMarkCleanupStack(____t); \ sl@0: { TRAP_INSTRUMENTATION_NOLEAVE; } \ sl@0: __WIN32SEHUNTRAP \ sl@0: } \ sl@0: catch (XLeaveException& l) \ sl@0: { \ sl@0: _r = l.GetReason(); \ sl@0: { TRAP_INSTRUMENTATION_LEAVE(_r); } \ sl@0: } \ sl@0: catch (...) \ sl@0: { \ sl@0: User::Invariant(); \ sl@0: } \ sl@0: __CALL_EMPTY_FUNCTION \ sl@0: { TRAP_INSTRUMENTATION_END; } \ sl@0: } sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Executes the set of C++ statements _s under a trap harness. sl@0: Any leave code generated is ignored. sl@0: sl@0: Use this macro as a C++ statement. sl@0: sl@0: This macro is functionally equivalent to: sl@0: @code sl@0: TInt x; sl@0: TRAP(x,_s) sl@0: @endcode sl@0: or sl@0: @code sl@0: TRAPD(x,_s) sl@0: @endcode sl@0: where the value in 'x' is not used by any subsequent code. sl@0: sl@0: Use this macro as a C++ statement. sl@0: sl@0: _s can consist of multiple C++ statements; in theory, _s can consist sl@0: of any legal C++ code but in practice, such statements consist of simple sl@0: function calls, e.g. Foo() or an assignment of some value to the result of sl@0: a function call, e.g. functionValue=GetFoo(). sl@0: sl@0: A cleanup stack is constructed for the set of C++ statements _s. sl@0: If any function in _s leaves, objects pushed to the cleanup stack are sl@0: cleaned-up. In addition, if any of the C++ statements in _s leaves, sl@0: then remaining C++ code in _s is not executed and any variables which sl@0: are assigned within that remaining code are not defined. sl@0: sl@0: @param _s C++ statements which will be executed under a trap harness. sl@0: sl@0: @see TRAPD sl@0: @see TRAP sl@0: */ sl@0: sl@0: /*__CALL_EMPTY_FUNCTION(call to a function with an empty body) was added as a sl@0: workaround to a compiler bug (mwccsym2 - winscw ) which caused an incorrect sl@0: trap handler to be invoked when multiple nested TRAP's were present and sl@0: User::Leave(..) was called. */ sl@0: sl@0: #define TRAP_IGNORE(_s) \ sl@0: { \ sl@0: { TRAP_INSTRUMENTATION_START; } \ sl@0: try { \ sl@0: __WIN32SEHTRAP \ sl@0: TTrapHandler* ____t = User::MarkCleanupStack(); \ sl@0: _s; \ sl@0: User::UnMarkCleanupStack(____t); \ sl@0: { TRAP_INSTRUMENTATION_NOLEAVE; } \ sl@0: __WIN32SEHUNTRAP \ sl@0: } \ sl@0: catch (XLeaveException& l) \ sl@0: { \ sl@0: l.GetReason(); \ sl@0: { TRAP_INSTRUMENTATION_LEAVE(l.Reason()); } \ sl@0: } \ sl@0: catch (...) \ sl@0: { \ sl@0: User::Invariant(); \ sl@0: } \ sl@0: __CALL_EMPTY_FUNCTION \ sl@0: { TRAP_INSTRUMENTATION_END; } \ sl@0: } sl@0: sl@0: sl@0: #endif //__LEAVE_EQUALS_THROW__ sl@0: sl@0: /* The macro __SYMBIAN_STDCPP_SUPPORT__ is defined when building a StdC++ target. sl@0: * In this case, operator new and operator delete below should not be declared sl@0: * to avoid clashing with StdC++ declarations. sl@0: */ sl@0: sl@0: #ifndef __SYMBIAN_STDCPP_SUPPORT__ sl@0: sl@0: #ifndef __OPERATOR_NEW_DECLARED__ sl@0: sl@0: /* Some operator new and operator delete overloads may be declared in compiler sl@0: * pre-include files. sl@0: * sl@0: * __OPERATOR_NEW_DECLARED__ is #defined if they are, so that we can avoid sl@0: * re-declaring them here. sl@0: */ sl@0: sl@0: #define __OPERATOR_NEW_DECLARED__ sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: GLREF_C TAny* operator new(TUint aSize) __NO_THROW; sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: GLREF_C TAny* operator new(TUint aSize,TUint anExtraSize) __NO_THROW; sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: GLREF_C void operator delete(TAny* aPtr) __NO_THROW; sl@0: sl@0: #ifndef __OMIT_VEC_OPERATOR_NEW_DECL__ sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: GLREF_C TAny* operator new[](TUint aSize) __NO_THROW; sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: GLREF_C void operator delete[](TAny* aPtr) __NO_THROW; sl@0: #endif // !__OMIT_VEC_OPERATOR_NEW_DECL__ sl@0: sl@0: #endif // !__OPERATOR_NEW_DECLARED__ sl@0: sl@0: #endif // !__SYMBIAN_STDCPP_SUPPORT__ sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: inline TAny* operator new(TUint aSize, TAny* aBase) __NO_THROW; sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: inline void operator delete(TAny* aPtr, TAny* aBase) __NO_THROW; sl@0: sl@0: #ifndef __PLACEMENT_VEC_NEW_INLINE sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: inline TAny* operator new[](TUint aSize, TAny* aBase) __NO_THROW; sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: inline void operator delete[](TAny* aPtr, TAny* aBase) __NO_THROW; sl@0: sl@0: #endif // !__PLACEMENT_VEC_NEW_INLINE sl@0: sl@0: #if !defined(__BOOL_NO_TRUE_TRAP__) sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: TBool operator==(TTrue,volatile const TBool); sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: TBool operator==(volatile const TBool,TTrue); sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: TBool operator!=(TTrue,volatile const TBool); sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: */ sl@0: TBool operator!=(volatile const TBool,TTrue); sl@0: #endif sl@0: sl@0: sl@0: sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: A Version 2 client/server class that clients use to package sl@0: the arguments to be sent to a server. sl@0: sl@0: The object can package up to 4 arguments together with information about each sl@0: argument's type, width and accessibility; it is also possible for sl@0: the package to contain zero arguments. In addition to the default constructor, sl@0: the class has four templated constructors, allowing an object of this type to sl@0: be constructed for 0, 1, 2, 3 or 4 arguments. sl@0: sl@0: Internally, the arguments are stored in a simple TInt array. sl@0: Consecutive arguments in a constructor's parameter list are put into sl@0: consecutive slots in the array. The Set() overloaded functions can be used sl@0: to set argument values into specific slots within this array. sl@0: */ sl@0: class TIpcArgs sl@0: { sl@0: public: sl@0: /** sl@0: @internalComponent sl@0: sl@0: Argument types; some of these may be ORed together to specify sl@0: type, accessibility, and width. sl@0: */ sl@0: enum TArgType sl@0: { sl@0: EUnspecified = 0, /**< Type not specified.*/ sl@0: EHandle = 1, /**< Handle type.*/ sl@0: EFlagDes = 4, /**< Descriptor type.*/ sl@0: EFlagConst = 2, /**< Read only type.*/ sl@0: EFlag16Bit = 1, /**< 16 bit rather than 8 bit.*/ sl@0: EDes8 = EFlagDes, /**< 8 bit read/write descriptor.*/ sl@0: EDes16 = EFlagDes|EFlag16Bit, /**< 16 bit read/write descriptor.*/ sl@0: EDesC8 = EFlagDes|EFlagConst, /**< 8 bit read only descriptor.*/ sl@0: EDesC16 = EFlagDes|EFlagConst|EFlag16Bit, /**< 16 bit read only descriptor.*/ sl@0: }; sl@0: sl@0: sl@0: /** sl@0: @internalComponent sl@0: */ sl@0: enum sl@0: { sl@0: KBitsPerType = 3, /**< Number of bits of type information used for each of the 4 arguments.*/ sl@0: KPinArgShift = KBitsPerType*KMaxMessageArguments, /**< Bit number of the start of the pin flags. */ sl@0: KPinArg0 = 1<<(KPinArgShift+0), /**< Set to pin argument at index 0.*/ sl@0: KPinArg1 = 1<<(KPinArgShift+1), /**< Set to pin argument at index 1.*/ sl@0: KPinArg2 = 1<<(KPinArgShift+2), /**< Set to pin argument at index 2.*/ sl@0: KPinArg3 = 1<<(KPinArgShift+3), /**< Set to pin argument at index 3.*/ sl@0: KPinMask = 0xf< sl@0: inline explicit TIpcArgs(T0 a0) sl@0: { sl@0: Assign(iArgs[0],a0); sl@0: iFlags=(Type(a0)<<(0*KBitsPerType)); sl@0: } sl@0: sl@0: sl@0: /** sl@0: A templated constructor that constructs the argument package; it takes sl@0: 2 arguments. sl@0: sl@0: @param a0 An argument of general class type T0 to be contained by sl@0: this object. sl@0: @param a1 An argument of general class type T1 to be contained by sl@0: this object. sl@0: */ sl@0: template sl@0: inline TIpcArgs(T0 a0,T1 a1) sl@0: { sl@0: Assign(iArgs[0],a0); sl@0: Assign(iArgs[1],a1); sl@0: iFlags=(Type(a0)<<(0*KBitsPerType))|(Type(a1)<<(1*KBitsPerType)); sl@0: } sl@0: sl@0: sl@0: /** sl@0: A templated constructor that constructs the argument package; it takes sl@0: 3 arguments. sl@0: sl@0: @param a0 An argument of general class type T0 to be contained by sl@0: this object. sl@0: @param a1 An argument of general class type T1 to be contained by sl@0: this object. sl@0: @param a2 An argument of general class type T2 to be contained by sl@0: this object. sl@0: */ sl@0: template sl@0: inline TIpcArgs(T0 a0,T1 a1,T2 a2) sl@0: { sl@0: Assign(iArgs[0],a0); sl@0: Assign(iArgs[1],a1); sl@0: Assign(iArgs[2],a2); sl@0: iFlags=(Type(a0)<<(0*KBitsPerType))|(Type(a1)<<(1*KBitsPerType))|(Type(a2)<<(2*KBitsPerType)); sl@0: } sl@0: sl@0: sl@0: /** sl@0: A templated constructor that constructs the argument package; it takes sl@0: 4 arguments. sl@0: sl@0: @param a0 An argument of general class type T0 to be contained by sl@0: this object. sl@0: @param a1 An argument of general class type T1 to be contained by sl@0: this object. sl@0: @param a2 An argument of general class type T2 to be contained by sl@0: this object. sl@0: @param a3 An argument of general class type T3 to be contained by sl@0: this object. sl@0: */ sl@0: template sl@0: inline TIpcArgs(T0 a0,T1 a1,T2 a2,T3 a3) sl@0: { sl@0: Assign(iArgs[0],a0); sl@0: Assign(iArgs[1],a1); sl@0: Assign(iArgs[2],a2); sl@0: Assign(iArgs[3],a3); sl@0: iFlags=(Type(a0)<<(0*KBitsPerType))|(Type(a1)<<(1*KBitsPerType))|(Type(a2)<<(2*KBitsPerType))|(Type(a3)<<(3*KBitsPerType)); sl@0: } sl@0: // sl@0: inline void Set(TInt aIndex,TNothing); sl@0: inline void Set(TInt aIndex,TInt aValue); sl@0: inline void Set(TInt aIndex,const TAny* aValue); sl@0: inline void Set(TInt aIndex,RHandleBase aValue); sl@0: inline void Set(TInt aIndex,const TDesC8* aValue); sl@0: #ifndef __KERNEL_MODE__ sl@0: inline void Set(TInt aIndex,const TDesC16* aValue); sl@0: #endif sl@0: inline void Set(TInt aIndex,TDes8* aValue); sl@0: #ifndef __KERNEL_MODE__ sl@0: inline void Set(TInt aIndex,TDes16* aValue); sl@0: #endif sl@0: sl@0: inline TIpcArgs& PinArgs(TBool aPinArg0=ETrue, TBool aPinArg1=ETrue, TBool aPinArg2=ETrue, TBool aPinArg3=ETrue); sl@0: private: sl@0: inline static TArgType Type(TNothing); sl@0: inline static TArgType Type(TInt); sl@0: inline static TArgType Type(const TAny*); sl@0: inline static TArgType Type(RHandleBase aValue); sl@0: inline static TArgType Type(const TDesC8*); sl@0: #ifndef __KERNEL_MODE__ sl@0: inline static TArgType Type(const TDesC16*); sl@0: #endif sl@0: inline static TArgType Type(TDes8*); sl@0: #ifndef __KERNEL_MODE__ sl@0: inline static TArgType Type(TDes16*); sl@0: #endif sl@0: // sl@0: inline static void Assign(TInt&,TNothing); sl@0: inline static void Assign(TInt& aArg,TInt aValue); sl@0: inline static void Assign(TInt& aArg,const TAny* aValue); sl@0: inline static void Assign(TInt& aArg,RHandleBase aValue); sl@0: inline static void Assign(TInt& aArg,const TDesC8* aValue); sl@0: #ifndef __KERNEL_MODE__ sl@0: inline static void Assign(TInt& aArg,const TDesC16* aValue); sl@0: #endif sl@0: inline static void Assign(TInt& aArg,TDes8* aValue); sl@0: #ifndef __KERNEL_MODE__ sl@0: inline static void Assign(TInt& aArg,TDes16* aValue); sl@0: #endif sl@0: public: sl@0: sl@0: /** sl@0: The location where the message arguments are stored. sl@0: sl@0: There is no reason to access this data member directly and it should be sl@0: considered as internal. sl@0: */ sl@0: TInt iArgs[KMaxMessageArguments]; sl@0: sl@0: /** sl@0: The location where the flag bits describing the argument types are stored. sl@0: sl@0: The symbolic values describing the argument types are internal to Symbian, sl@0: and there is therefore no reason to access this data member directly. sl@0: It should be considered as internal. sl@0: */ sl@0: TInt iFlags; sl@0: }; sl@0: sl@0: // Structures for passing 64 bit integers and doubles across GCC/EABI boundaries sl@0: sl@0: /** sl@0: @internalComponent sl@0: */ sl@0: struct SInt64 sl@0: { sl@0: public: sl@0: inline SInt64(); sl@0: inline SInt64(Int64 a); sl@0: inline SInt64& operator=(Int64 a); sl@0: inline operator Int64() const; sl@0: public: sl@0: TUint32 iData[2]; // little endian sl@0: }; sl@0: sl@0: /** sl@0: @internalComponent sl@0: */ sl@0: struct SUint64 sl@0: { sl@0: public: sl@0: inline SUint64(); sl@0: inline SUint64(Uint64 a); sl@0: inline SUint64& operator=(Uint64 a); sl@0: inline operator Uint64() const; sl@0: public: sl@0: TUint32 iData[2]; // little endian sl@0: }; sl@0: sl@0: /** sl@0: @internalComponent sl@0: */ sl@0: struct SDouble sl@0: { sl@0: public: sl@0: inline SDouble(); sl@0: inline SDouble(TReal a); sl@0: inline SDouble& operator=(TReal a); sl@0: inline operator TReal() const; sl@0: public: sl@0: TUint32 iData[2]; // always little endian sl@0: }; sl@0: sl@0: /** sl@0: @publishedAll sl@0: @released sl@0: sl@0: Stores information about a thread's stack. sl@0: sl@0: Note, on the emulator, the memory between iLimit and the thread's current stack pointer sl@0: may not actually be committed. sl@0: sl@0: @see RThread::StackInfo() sl@0: */ sl@0: class TThreadStackInfo sl@0: { sl@0: public: sl@0: /** sl@0: The address which the stack pointer would contain if the stack were empty. sl@0: */ sl@0: TLinAddr iBase; sl@0: sl@0: /** sl@0: The address which the stack pointer would contain if the stack were full, sl@0: (The lowest valid address). sl@0: */ sl@0: TLinAddr iLimit; sl@0: sl@0: /** sl@0: The limit value for the stack if it were expanded to its maximum size. sl@0: sl@0: Currently expanding stacks is not supported so iExpandLimit==iLimit sl@0: */ sl@0: TLinAddr iExpandLimit; sl@0: }; sl@0: sl@0: sl@0: sl@0: sl@0: #ifdef __SUPPORT_CPP_EXCEPTIONS__ sl@0: /** sl@0: @internalComponent sl@0: @released sl@0: sl@0: The class used to implement User::Leave in term of throw and TRAP in terms of catch. sl@0: sl@0: */ sl@0: class XLeaveException sl@0: { sl@0: public: sl@0: inline XLeaveException() {} sl@0: inline XLeaveException(TInt aReason) {iR = aReason;} sl@0: inline TInt Reason() const {return iR;} sl@0: IMPORT_C TInt GetReason() const; sl@0: private: sl@0: #if __ARMCC_VERSION >= 220000 sl@0: // From rvct 2.2 onwards we want the class impedimenta to be shared, so create a key function. sl@0: // Unfortunately we can't make this the key function the dtor since this would make it impossible for existing 2.1 sl@0: // derived binaries to be 'BC' with 2.2 binaries (in the general case (which I wont attempt to describe coz its sl@0: // too complex) so its best to be safe). As a clue: if 2.1 is used to compile with a key function its not possible sl@0: // for catch handlers to work :-( (see the old code). sl@0: virtual void ForceKeyFunction(); sl@0: #endif sl@0: private: sl@0: #if __ARMCC_VERSION < 220000 sl@0: TAny* iVtable; // reserve space for vtable sl@0: #endif sl@0: TInt iR; sl@0: }; sl@0: sl@0: // The standard header file defines the following guard macro for EDG and CW, VC++, GCC respectively. sl@0: // The guard below is ugly. It will surely come back and bite us unless we resolve the whole issue of standard headers sl@0: // when we move to supporting Standard C++. sl@0: sl@0: // The macro __SYMBIAN_STDCPP_SUPPORT__ is defined when building a StdC++ target. sl@0: // In this case, we include the StdC++ specification rather than declaring uncaught_exception. sl@0: sl@0: #ifdef __SYMBIAN_STDCPP_SUPPORT__ sl@0: #include sl@0: #elif !defined(_EXCEPTION) && !defined(_EXCEPTION_) && !defined(__EXCEPTION__) sl@0: // Declare standard C++ functions relating to exceptions here sl@0: namespace std { sl@0: #if defined(__VC32__) || defined(__CW32__) sl@0: bool uncaught_exception(); sl@0: #else sl@0: IMPORT_C bool uncaught_exception(); sl@0: #endif sl@0: void terminate(void); sl@0: void unexpected(void); sl@0: typedef void (*terminate_handler)(); sl@0: terminate_handler set_terminate(terminate_handler h) throw(); sl@0: typedef void (*unexpected_handler)(); sl@0: unexpected_handler set_unexpected(unexpected_handler h) throw(); sl@0: } sl@0: sl@0: #endif sl@0: #endif //__SUPPORT_CPP_EXCEPTIONS__ sl@0: sl@0: #ifdef __WINS__ sl@0: sl@0: #ifndef __WIN32_SEH_TYPES_KNOWN__ sl@0: class __UnknownWindowsType1; sl@0: class __UnknownWindowsType2; sl@0: #endif sl@0: sl@0: class TWin32SEHTrap; sl@0: sl@0: /** sl@0: * Typedef for the SEH handler function sl@0: * @internalComponent sl@0: */ sl@0: typedef TUint32 (TWin32SEHExceptionHandler)(__UnknownWindowsType1* aExceptionRecord, TWin32SEHTrap* aRegistrationRecord, __UnknownWindowsType2* aContext); sl@0: sl@0: /** sl@0: * @internalComponent sl@0: */ sl@0: class TWin32SEHTrap sl@0: { sl@0: private: sl@0: // Prevent copy/assign sl@0: TWin32SEHTrap(TWin32SEHTrap const &); sl@0: TWin32SEHTrap& operator=(TWin32SEHTrap const &); sl@0: sl@0: #ifdef __KERNEL_MODE__ sl@0: // sl@0: // Kernel-side functions for nkern exception handler sl@0: // sl@0: public: sl@0: /** Find final exception handler in SEH chain */ sl@0: static TWin32SEHTrap* IterateForFinal(); sl@0: sl@0: /** Access exception handler */ sl@0: TWin32SEHExceptionHandler* ExceptionHandler(); sl@0: sl@0: private: sl@0: sl@0: #else // !__KERNEL_MODE__ sl@0: // sl@0: // User-side functions for use in TRAP(...) sl@0: // sl@0: public: sl@0: UIMPORT_C TWin32SEHTrap(); sl@0: sl@0: public: sl@0: /** Add object to SEH chain */ sl@0: UIMPORT_C void Trap(); sl@0: sl@0: /** Remove object from SEH chain */ sl@0: UIMPORT_C void UnTrap(); sl@0: sl@0: #ifndef __IN_SEH_CPP__ sl@0: private: sl@0: #endif sl@0: /** Handle Win32 exceptions */ sl@0: static TUint32 ExceptionHandler(__UnknownWindowsType1* aException, TWin32SEHTrap* aRegistrationRecord, __UnknownWindowsType2* aContext); sl@0: sl@0: #endif //__KERNEL_MODE__ sl@0: sl@0: // sl@0: // NB: This is really an _EXCEPTION_REGISTRATION_RECORD sl@0: // sl@0: TWin32SEHTrap* iPrevExceptionRegistrationRecord; /** Link to previous SEH record */ sl@0: TWin32SEHExceptionHandler* iExceptionHandler; /** SEH handler function */ sl@0: sl@0: private: sl@0: TUint32 iPadding[254]; // discourage the compiler from putting this in reused function parameter space sl@0: }; sl@0: sl@0: #else // !__WINS__ sl@0: sl@0: #ifdef __X86__ sl@0: /** sl@0: * @internalComponent sl@0: */ sl@0: class TWin32SEHTrap sl@0: { sl@0: public: sl@0: UIMPORT_C TWin32SEHTrap(); sl@0: UIMPORT_C void Trap(); sl@0: UIMPORT_C void UnTrap(); sl@0: }; sl@0: #endif //__X86__ sl@0: #endif //__WINS__ sl@0: sl@0: /** sl@0: @internalTechnology sl@0: */ sl@0: struct TEmulatorImageHeader sl@0: { sl@0: TUid iUids[KMaxCheckedUid]; sl@0: TProcessPriority iPriority; sl@0: SSecurityInfo iS; sl@0: TUint32 iSpare1; sl@0: TUint32 iSpare2; sl@0: TUint32 iModuleVersion; sl@0: TUint32 iFlags; sl@0: }; sl@0: sl@0: // forward declaration of shareable data buffers pool infomation sl@0: class TShPoolInfo; sl@0: sl@0: #include sl@0: sl@0: #ifndef SYMBIAN_ENABLE_SPLIT_HEADERS sl@0: #include sl@0: #endif sl@0: sl@0: #endif //__E32CMN_H__ sl@0: