sl@0: /* sl@0: * Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies). sl@0: * All rights reserved. sl@0: * This component and the accompanying materials are made available sl@0: * under the terms of "Eclipse Public License v1.0" sl@0: * which accompanies this distribution, and is available sl@0: * at the URL "http://www.eclipse.org/legal/epl-v10.html". sl@0: * sl@0: * Initial Contributors: sl@0: * Nokia Corporation - initial contribution. sl@0: * sl@0: * Contributors: sl@0: * sl@0: * Description: sl@0: * sl@0: */ sl@0: sl@0: sl@0: sl@0: #ifndef FEATMGR_SECURITY_POLICY_H sl@0: #define FEATMGR_SECURITY_POLICY_H sl@0: sl@0: sl@0: /** sl@0: * Number of different IPC ranges sl@0: */ sl@0: const TUint KFeatMgrPlatSecRangeCount = 3; sl@0: sl@0: sl@0: #ifndef EXTENDED_FEATURE_MANAGER_TEST sl@0: // sl@0: // NORMAL sl@0: // The security ranges for messages in the framework. sl@0: // See also featmgrclientserver.h for message enum TFeatMgrServRequest sl@0: // sl@0: sl@0: /** sl@0: * IPC ranges segmented into groups based on their capability requirements sl@0: */ sl@0: const TInt KFeatMgrPlatSecRanges[KFeatMgrPlatSecRangeCount] = sl@0: { sl@0: 0, // IPC 0-7 Always passed sl@0: 8, // IPC 8-19 WriteDeviceData sl@0: 20 // IPC Not supported: 20 = 16 messages + 4 "resource check" messages sl@0: }; sl@0: sl@0: sl@0: /** sl@0: * IPC segments and their capability requirements sl@0: */ sl@0: const TUint8 KFeatMgrPlatSecElementsIndex[KFeatMgrPlatSecRangeCount] = sl@0: { sl@0: CPolicyServer::EAlwaysPass, // IPC 0-3 sl@0: 0, // IPC 8-19 sl@0: CPolicyServer::ENotSupported // IPC 20 -> sl@0: }; sl@0: sl@0: #else sl@0: // sl@0: // CONFIGURED test server has debug only API(s) built into the framework. sl@0: // e.g. EFeatMgrNumberOfNotifyFeatures which will return debug information about sl@0: // the server for testing purposes. Consequently, the platform security setup sl@0: // for the test server differs slightly to allow these specific debug only message(s). sl@0: // sl@0: sl@0: /** sl@0: * IPC ranges segmented into groups based on their capability requirements sl@0: */ sl@0: const TInt KFeatMgrPlatSecRanges[KFeatMgrPlatSecRangeCount] = sl@0: { sl@0: 0, // IPC 0-9 Always passed sl@0: 10, // IPC 10-21 WriteDeviceData sl@0: 22 // IPC Not supported 22 -> sl@0: }; sl@0: /** sl@0: * IPC segments and their capability requirements sl@0: */ sl@0: const TUint8 KFeatMgrPlatSecElementsIndex[KFeatMgrPlatSecRangeCount] = sl@0: { sl@0: CPolicyServer::EAlwaysPass, // IPC 0-3 sl@0: 0, // IPC 10-21 sl@0: CPolicyServer::ENotSupported // IPC 22 -> sl@0: }; sl@0: sl@0: #endif sl@0: sl@0: sl@0: /** sl@0: * Capability sets and the action performed in case of failure sl@0: */ sl@0: const CPolicyServer::TPolicyElement KFeatMgrPlatSecElements[] = sl@0: { sl@0: sl@0: { sl@0: _INIT_SECURITY_POLICY_C1( ECapabilityWriteDeviceData ), sl@0: CPolicyServer::EFailClient sl@0: } sl@0: sl@0: }; sl@0: sl@0: sl@0: /** sl@0: * Platform security policy that Feature Manager server uses. sl@0: */ sl@0: const CPolicyServer::TPolicy KFeatMgrPlatSecPolicy = sl@0: { sl@0: CPolicyServer::EAlwaysPass, // Specifies all connect attempts should pass sl@0: KFeatMgrPlatSecRangeCount, // Number of IPC ranges sl@0: KFeatMgrPlatSecRanges, // IPC Ranges sl@0: KFeatMgrPlatSecElementsIndex, // Policy to IPC mapping array sl@0: KFeatMgrPlatSecElements // Policies used in Feature Manager Server sl@0: }; sl@0: sl@0: sl@0: #endif