1 /* |
|
2 * Copyright (c) 2008 Nokia Corporation and/or its subsidiary(-ies). |
|
3 * All rights reserved. |
|
4 * This component and the accompanying materials are made available |
|
5 * under the terms of "Eclipse Public License v1.0" |
|
6 * which accompanies this distribution, and is available |
|
7 * at the URL "http://www.eclipse.org/legal/epl-v10.html". |
|
8 * |
|
9 * Initial Contributors: |
|
10 * Nokia Corporation - initial contribution. |
|
11 * |
|
12 * Contributors: |
|
13 * |
|
14 * Description: ?Description |
|
15 * Version : %version: ou1s60ui#5.1.2 % << Don't touch! Updated by Synergy at check-out. |
|
16 * |
|
17 */ |
|
18 |
|
19 |
|
20 #include <s32mem.h> |
|
21 #include <liwcommon.h> |
|
22 #include <e32std.h> |
|
23 |
|
24 #include "cpsecuritypolicy.h" |
|
25 #include "cpdebug.h" |
|
26 #include "cpglobals.h" |
|
27 |
|
28 _LIT( KHex, "0x" ); |
|
29 _LIT( KTCB, "TCB" ); |
|
30 _LIT( KLocalServices, "LocalServices" ); |
|
31 _LIT( KLocation, "Location" ); |
|
32 _LIT( KNetworkServices, "NetworkServices" ); |
|
33 _LIT( KReadUserData, "ReadUserData" ); |
|
34 _LIT( KUserEnvironment, "UserEnvironment" ); |
|
35 _LIT( KWriteUserData, "WriteUserData" ); |
|
36 _LIT( KAllFiles, "AllFiles" ); |
|
37 _LIT( KCommDD, "CommDD" ); |
|
38 _LIT( KDiskAdmin, "DiskAdmin" ); |
|
39 _LIT( KDrm, "Drm" ); |
|
40 _LIT( KMultimediaDD, "MultimediaDD" ); |
|
41 _LIT( KNetworkControl, "NetworkControl" ); |
|
42 _LIT( KPowerMgmt, "PowerMgmt" ); |
|
43 _LIT( KProtServ, "ProtServ" ); |
|
44 _LIT( KReadDeviceData, "ReadDeviceData" ); |
|
45 _LIT( KSurroundingsDD, "SurroundingsDD" ); |
|
46 _LIT( KSwEvent, "SwEvent" ); |
|
47 _LIT( KTrustedUI, "TrustedUI" ); |
|
48 _LIT( KWriteDeviceData, "WriteDeviceData" ); |
|
49 |
|
50 |
|
51 // ======== MEMBER FUNCTIONS ======== |
|
52 |
|
53 // --------------------------------------------------------------------------- |
|
54 // |
|
55 // --------------------------------------------------------------------------- |
|
56 // |
|
57 CCPSecurityPolicy::CCPSecurityPolicy( const RMessage2& aMessage ): |
|
58 iMessage( aMessage ) |
|
59 { |
|
60 |
|
61 } |
|
62 |
|
63 // --------------------------------------------------------------------------- |
|
64 // |
|
65 // --------------------------------------------------------------------------- |
|
66 // |
|
67 void CCPSecurityPolicy::ConstructL() |
|
68 { |
|
69 |
|
70 } |
|
71 |
|
72 // --------------------------------------------------------------------------- |
|
73 // |
|
74 // --------------------------------------------------------------------------- |
|
75 // |
|
76 CCPSecurityPolicy* CCPSecurityPolicy::NewL( const RMessage2& aMessage ) |
|
77 { |
|
78 CCPSecurityPolicy* self = CCPSecurityPolicy::NewLC( aMessage ); |
|
79 CleanupStack::Pop( self ); |
|
80 return self; |
|
81 } |
|
82 |
|
83 // --------------------------------------------------------------------------- |
|
84 // |
|
85 // --------------------------------------------------------------------------- |
|
86 // |
|
87 CCPSecurityPolicy* CCPSecurityPolicy::NewLC( const RMessage2& aMessage ) |
|
88 { |
|
89 CCPSecurityPolicy* self = new( ELeave ) CCPSecurityPolicy( aMessage ); |
|
90 CleanupStack::PushL( self ); |
|
91 self->ConstructL(); |
|
92 return self; |
|
93 } |
|
94 |
|
95 // --------------------------------------------------------------------------- |
|
96 // |
|
97 // --------------------------------------------------------------------------- |
|
98 // |
|
99 CCPSecurityPolicy::~CCPSecurityPolicy() |
|
100 { |
|
101 } |
|
102 |
|
103 // --------------------------------------------------------------------------- |
|
104 // |
|
105 // --------------------------------------------------------------------------- |
|
106 // |
|
107 void CCPSecurityPolicy::GetDefaultSecurityL( RBuf8& aResult ) const |
|
108 { |
|
109 CLiwDefaultMap* aclMap = CLiwDefaultMap::NewLC(); |
|
110 CLiwDefaultMap* writeMap = CLiwDefaultMap::NewLC(); |
|
111 CLiwDefaultMap* deleteMap = CLiwDefaultMap::NewLC(); |
|
112 |
|
113 TUint32 publisherUid = iMessage.SecureId(); |
|
114 |
|
115 TBuf<10> uidString; |
|
116 uidString.Append( KHex ); |
|
117 uidString.AppendNumFixedWidth(publisherUid,EHex,8); |
|
118 |
|
119 writeMap->InsertL( KUIDs, TLiwVariant( uidString ) ); |
|
120 deleteMap->InsertL( KUIDs, TLiwVariant( uidString ) ); |
|
121 |
|
122 aclMap->InsertL( KACLWrite, TLiwVariant( writeMap ) ); |
|
123 aclMap->InsertL( KACLDelete, TLiwVariant( deleteMap ) ); |
|
124 |
|
125 //externalize |
|
126 aResult.CreateL( aclMap->Size() ); |
|
127 RDesWriteStream strm( aResult ); |
|
128 CleanupClosePushL( strm ); |
|
129 aclMap->ExternalizeL( strm ); |
|
130 strm.CommitL( ); |
|
131 |
|
132 CleanupStack::PopAndDestroy( &strm ); |
|
133 CleanupStack::PopAndDestroy( deleteMap ); |
|
134 CleanupStack::PopAndDestroy( writeMap ); |
|
135 CleanupStack::PopAndDestroy( aclMap ); |
|
136 } |
|
137 |
|
138 // --------------------------------------------------------------------------- |
|
139 // |
|
140 // --------------------------------------------------------------------------- |
|
141 // |
|
142 TBool CCPSecurityPolicy::CheckSecurityL( TPtrC8& aBinary, |
|
143 TACLPolicy aPolicy ) const |
|
144 { |
|
145 TBool error( ETrue ); |
|
146 RDesReadStream datastrm( aBinary ); |
|
147 CleanupClosePushL( datastrm ); |
|
148 CLiwDefaultMap* map = CLiwDefaultMap::NewLC( datastrm ); |
|
149 TLiwVariant variant; |
|
150 variant.PushL(); |
|
151 switch( aPolicy ) |
|
152 { |
|
153 case ERead: |
|
154 if( map->FindL( KACLRead, variant ) ) |
|
155 { |
|
156 error = DoCheckSecurityL( variant.AsMap() ); |
|
157 } |
|
158 break; |
|
159 case EWrite: |
|
160 if( map->FindL( KACLWrite, variant ) ) |
|
161 { |
|
162 error = DoCheckSecurityL( variant.AsMap() ); |
|
163 } |
|
164 break; |
|
165 case EDelete: |
|
166 if( map->FindL( KACLDelete, variant ) ) |
|
167 { |
|
168 error = DoCheckSecurityL( variant.AsMap() ); |
|
169 } |
|
170 break; |
|
171 default: |
|
172 User::Leave( KErrNotSupported ); |
|
173 } |
|
174 CleanupStack::PopAndDestroy( &variant ); |
|
175 CleanupStack::PopAndDestroy( map ); |
|
176 CleanupStack::PopAndDestroy( &datastrm ); |
|
177 return error; |
|
178 } |
|
179 |
|
180 // --------------------------------------------------------------------------- |
|
181 // |
|
182 // --------------------------------------------------------------------------- |
|
183 // |
|
184 TBool CCPSecurityPolicy::DoCheckSecurityL( const CLiwMap* aMap ) const |
|
185 { |
|
186 TLiwVariant variant; |
|
187 variant.PushL(); |
|
188 TBool denyAccess( ETrue ); |
|
189 if( aMap->FindL( KUIDs, variant ) ) |
|
190 { |
|
191 TPtrC uidList( KNullDesC ); |
|
192 if( variant.Get( uidList) ) |
|
193 { |
|
194 denyAccess = CheckUids( uidList ); |
|
195 } |
|
196 } |
|
197 if( denyAccess && aMap->FindL( KCapability, variant ) ) |
|
198 { |
|
199 TPtrC capList( KNullDesC ); |
|
200 if( variant.Get( capList ) ) |
|
201 { |
|
202 denyAccess = CheckCapabilities( capList ); |
|
203 } |
|
204 } |
|
205 CleanupStack::PopAndDestroy( &variant ); |
|
206 return !denyAccess; |
|
207 } |
|
208 |
|
209 // --------------------------------------------------------------------------- |
|
210 // |
|
211 // --------------------------------------------------------------------------- |
|
212 // |
|
213 TBool CCPSecurityPolicy::CheckUids( const TDesC& aList ) const |
|
214 { |
|
215 TInt i( 1 ); |
|
216 TBool denyAccess( ETrue ); |
|
217 TPtrC singleUid( KNullDesC ); |
|
218 while( i ) |
|
219 { |
|
220 ExctractNextToken( aList , singleUid, i ); |
|
221 TLex converter( singleUid ); |
|
222 converter.Inc( KHex().Length() ); |
|
223 TUint32 aclUid( 0 ); |
|
224 converter.Val( aclUid , EHex ); |
|
225 if( iMessage.SecureId().iId == aclUid ) |
|
226 { |
|
227 denyAccess = EFalse; |
|
228 break; |
|
229 } |
|
230 ++i; |
|
231 } |
|
232 return denyAccess; |
|
233 } |
|
234 |
|
235 // --------------------------------------------------------------------------- |
|
236 // |
|
237 // --------------------------------------------------------------------------- |
|
238 // |
|
239 TBool CCPSecurityPolicy::CheckCapabilities( const TDesC& aList ) const |
|
240 { |
|
241 TInt i( 1 ); |
|
242 TBool denyAccess( EFalse ); |
|
243 TPtrC singleCap( KNullDesC ); |
|
244 while( i ) |
|
245 { |
|
246 ExctractNextToken( aList , singleCap, i ); |
|
247 if( !iMessage.HasCapability( GetCapability( singleCap ) ) ) |
|
248 { |
|
249 denyAccess = ETrue; |
|
250 break; |
|
251 } |
|
252 ++i; |
|
253 } |
|
254 return denyAccess; |
|
255 } |
|
256 |
|
257 // --------------------------------------------------------------------------- |
|
258 // |
|
259 // --------------------------------------------------------------------------- |
|
260 // |
|
261 void CCPSecurityPolicy::ExctractNextToken( const TDesC& aList, |
|
262 TPtrC& aResult , TInt& aPos ) const |
|
263 { |
|
264 TPtrC buf( aList ); |
|
265 for( TInt x(0); x < aPos; x++ ) |
|
266 { |
|
267 TInt pos = buf.Locate(':'); |
|
268 if( pos!= KErrNotFound ) |
|
269 { |
|
270 aResult.Set( buf.Left( pos ) ); |
|
271 buf.Set( buf.Right( buf.Length() - pos - 1 ) ); |
|
272 } |
|
273 else |
|
274 { |
|
275 aResult.Set( buf ); |
|
276 aPos = -1; |
|
277 break; |
|
278 } |
|
279 } |
|
280 } |
|
281 |
|
282 // --------------------------------------------------------------------------- |
|
283 // |
|
284 // --------------------------------------------------------------------------- |
|
285 // |
|
286 TCapability CCPSecurityPolicy::GetCapability( const TDesC& aCapability ) const |
|
287 { |
|
288 TCapability ret( ECapability_None ); |
|
289 if( aCapability == KTCB ) |
|
290 { |
|
291 ret = ECapabilityTCB; |
|
292 } |
|
293 else if( aCapability == KLocalServices ) |
|
294 { |
|
295 ret = ECapabilityLocalServices; |
|
296 } |
|
297 else if( aCapability == KLocation ) |
|
298 { |
|
299 ret = ECapabilityLocation; |
|
300 } |
|
301 else if( aCapability == KNetworkServices ) |
|
302 { |
|
303 ret = ECapabilityNetworkServices; |
|
304 } |
|
305 else if( aCapability == KReadUserData ) |
|
306 { |
|
307 ret = ECapabilityReadUserData; |
|
308 } |
|
309 else if( aCapability == KUserEnvironment ) |
|
310 { |
|
311 ret = ECapabilityUserEnvironment; |
|
312 } |
|
313 else if( aCapability == KWriteUserData ) |
|
314 { |
|
315 ret = ECapabilityWriteUserData; |
|
316 } |
|
317 else if( aCapability == KAllFiles ) |
|
318 { |
|
319 ret = ECapabilityAllFiles; |
|
320 } |
|
321 else if( aCapability == KDiskAdmin ) |
|
322 { |
|
323 ret = ECapabilityDiskAdmin; |
|
324 } |
|
325 else if( aCapability == KCommDD ) |
|
326 { |
|
327 ret = ECapabilityCommDD; |
|
328 } |
|
329 else if( aCapability == KDrm ) |
|
330 { |
|
331 ret = ECapabilityDRM; |
|
332 } |
|
333 else if( aCapability == KMultimediaDD ) |
|
334 { |
|
335 ret = ECapabilityMultimediaDD; |
|
336 } |
|
337 else if( aCapability == KNetworkControl ) |
|
338 { |
|
339 ret = ECapabilityNetworkControl; |
|
340 } |
|
341 else if( aCapability == KPowerMgmt ) |
|
342 { |
|
343 ret = ECapabilityPowerMgmt; |
|
344 } |
|
345 else if( aCapability == KProtServ ) |
|
346 { |
|
347 ret = ECapabilityProtServ; |
|
348 } |
|
349 else if( aCapability == KReadDeviceData ) |
|
350 { |
|
351 ret = ECapabilityReadDeviceData; |
|
352 } |
|
353 else if( aCapability == KSurroundingsDD ) |
|
354 { |
|
355 ret = ECapabilitySurroundingsDD; |
|
356 } |
|
357 else if( aCapability == KSwEvent ) |
|
358 { |
|
359 ret = ECapabilitySwEvent; |
|
360 } |
|
361 else if( aCapability == KTrustedUI ) |
|
362 { |
|
363 ret = ECapabilityTrustedUI; |
|
364 } |
|
365 else if( aCapability == KWriteDeviceData ) |
|
366 { |
|
367 ret = ECapabilityWriteDeviceData; |
|
368 } |
|
369 else ret = ECapability_None; |
|
370 return ret; |
|
371 } |
|
372 |
|