backupandrestore/backupengine/src/sbedataowner.cpp
author Dremov Kirill (Nokia-D-MSW/Tampere) <kirill.dremov@nokia.com>
Fri, 17 Sep 2010 08:34:51 +0300
changeset 47 63cf70d3ecd8
parent 33 883e91c086aa
child 52 866b4af7ffbe
permissions -rw-r--r--
Revision: 201035 Kit: 201037

// Copyright (c) 2004-2009 Nokia Corporation and/or its subsidiary(-ies).
// All rights reserved.
// This component and the accompanying materials are made available
// under the terms of "Eclipse Public License v1.0"
// which accompanies this distribution, and is available
// at the URL "http://www.eclipse.org/legal/epl-v10.html".
//
// Initial Contributors:
// Nokia Corporation - initial contribution.
//
// Contributors:
//
// Description:
// Implementation of CDataOwner
// 
//

/**
 @file
*/
#include <d32dbms.h>

#include "sbedataowner.h"
#include "abserver.h"
#include "sbtypes.h"
#include "sbeparserdefs.h"
#include "sbepanic.h"
#include "OstTraceDefinitions.h"
#include "sbtrace.h"
#ifdef OST_TRACE_COMPILER_IN_USE
#include "sbedataownerTraces.h"
#endif

namespace conn
	{	
	_LIT(KDrive, "?:");
	_LIT(KDriveAndSlash, "?:\\");
	_LIT(KPrivateMatch, "?:\\private\\*");
	_LIT(KPrivateSidMatch, "?:\\private\\");
	_LIT(KSys, "?:\\sys\\*");
	_LIT(KSystem, "?:\\system\\*");
	_LIT(KResource, "?:\\resource\\*");
	_LIT(KOther, "*\\..\\*");
	_LIT(KPad, "00000000"); // Used for padding if required
	_LIT(KQuestionMark, "?");
	_LIT8(KVersion, "1.0");
	_LIT( KExclamationAsDrive, "!"); // Used to generic drives for public data as in .SIS file package
	_LIT( KPrivateNoBackup, "?:\\private\\????????\\NoBackup\\*"); // Used to exclude the file if it is in "NoBackup" folder.
	
		
	
	void CleanupRPointerArray(TAny* aPtr)
		{
		OstTraceFunctionEntry0( _CONN_CLEANUPRPOINTERARRAY_ENTRY );
		RPointerArray<CBase>* array = static_cast<RPointerArray<CBase>*>(aPtr);
		array->ResetAndDestroy();
		delete array;
		OstTraceFunctionExit0( _CONN_CLEANUPRPOINTERARRAY_EXIT );
		}
	
	// CSelection //
	
	/**
	
	Symbian 2nd phase construction creates a Selection
	
	@param aType - Selection Type
	@param aSelection - Selection Nmae
	@return CSelection a pointer to a new object 
	*/
	CSelection* CSelection::NewLC(TSelectionType aType, const TDesC& aSelection)
		{
		OstTraceFunctionEntry0( CSELECTION_NEWLC_ENTRY );
		CSelection* self = new (ELeave) CSelection(aType);
		CleanupStack::PushL(self);
		self->ConstructL(aSelection);
		OstTraceFunctionExit0( CSELECTION_NEWLC_EXIT );
		return self;
		}
	
	/**
	Standard C++ destructor
	*/
	CSelection::~CSelection()
		{
		OstTraceFunctionEntry0( CSELECTION_CSELECTION_DES_ENTRY );
		delete iSelection;
		OstTraceFunctionExit0( CSELECTION_CSELECTION_DES_EXIT );
		}
	
	/**
	Standard C++ constructor
	*/
	CSelection::CSelection(TSelectionType aType) : iType(aType)
		{
		OstTraceFunctionEntry0( CSELECTION_CSELECTION_CONS_ENTRY );
		OstTraceFunctionExit0( CSELECTION_CSELECTION_CONS_EXIT );
		}
		
	/**
	Symbian 2nd phase constructor
	*/
	void CSelection::ConstructL(const TDesC& aSelection)
		{
		OstTraceFunctionEntry0( CSELECTION_CONSTRUCTL_ENTRY );
		iSelection = aSelection.AllocL();
		OstTraceFunctionExit0( CSELECTION_CONSTRUCTL_EXIT );
		}
	
	/**
	Selection Type
	
	@return TSelectionType Type
	*/
	TSelectionType CSelection::SelectionType() const
		{
		return iType;
		}
	
	/**
	Selection Name
	
	@return const TDesC& Name
	*/
	const TDesC& CSelection::SelectionName() const
		{
		return *iSelection;
		}
	
	// CSelection End //
		
	CDataOwner* CDataOwner::NewL(TSecureId aSID, CDataOwnerManager* apDataOwnerManager)
	/** Symbian OS static constructor

	@param aSID secure id of data owner
	@param apDataOwnerManager data owner manager to access resources
	@return a CDataOwner object
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_NEWL_ENTRY );
		CDataOwner* self = CDataOwner::NewLC(aSID, apDataOwnerManager);
		CleanupStack::Pop(self);

		OstTraceFunctionExit0( CDATAOWNER_NEWL_EXIT );
		return self;
		}

	CDataOwner* CDataOwner::NewLC(TSecureId aSID, CDataOwnerManager* apDataOwnerManager)
	/** Symbian OS static constructor

	@param aSID secure id of data owner
	@param apDataOwnerManager data owner manager to access resources
	@return a CDataOwner object
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_NEWLC_ENTRY );
		CDataOwner* self = new(ELeave) CDataOwner(aSID, apDataOwnerManager);
		CleanupStack::PushL(self);

		self->ConstructL();
		
		OstTraceFunctionExit0( CDATAOWNER_NEWLC_EXIT );
		return self;
		}

	CDataOwner::CDataOwner(TSecureId aSID, CDataOwnerManager* apDataOwnerManager) :
	    iStatus(EUnset), iFilesParsed(EFalse), iPrimaryFile(EFalse), /*iBackupAsPartial(EFalse), */
	    iSecureId(aSID),
	    iBufferFileWriter(NULL), iBufferFileReader(NULL), iBufferSnapshotWriter(NULL), 
	    iTempSnapshotHolder(NULL), ipDataOwnerManager(apDataOwnerManager)
	/** Standard C++ constructor

	@param aSID secure id of data owner
	@param apDataOwnerManager data owner manager to access resources
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_CDATAOWNER_CONS_ENTRY );
		OstTraceFunctionExit0( CDATAOWNER_CDATAOWNER_CONS_EXIT );
		}
		
	void CDataOwner::ConstructL()
	/** Symbian 2nd stage constructor */
		{
		OstTraceFunctionEntry0( CDATAOWNER_CONSTRUCTL_ENTRY );
		iRegistrationFiles = new (ELeave) CDesCArrayFlat(KDesCArrayGranularity);
		iPrivatePath = HBufC::NewL(0);
		iProxyInformationArray.Reset();
		iPublicDirStack.Reset();
		iPublicDirNameStack.Reset();
		iPublicExcludes.Reset();
		OstTraceFunctionExit0( CDATAOWNER_CONSTRUCTL_EXIT );
		}

	CDataOwner::~CDataOwner()
	/** Standard C++ destructor
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_CDATAOWNER_DES_ENTRY );
		// Close the RArrays
		iProxyInformationArray.Close();
		iStateByDrive.Close();
		iProxyStateByDrive.Close();
		iDBMSSelections.Close();
		
		iPublicSelections.ResetAndDestroy();
		iPassiveSelections.ResetAndDestroy();
		iSnapshots.ResetAndDestroy();
		
		for (TInt x = iPublicDirStack.Count(); x > 0; --x)
			{
			iPublicDirStack[x-1].Close();
			delete iPublicDirNameStack[x-1];
			}
		iPublicDirStack.Close();
		iPublicDirNameStack.Close();
		iPublicExcludes.Close();
		
		delete iPrivatePath;
		delete iBufferFileWriter;
		delete iBufferFileReader;
		delete iBufferSnapshotWriter;
		delete iBufferSnapshotReader;
		delete iTempSnapshotHolder;
		delete iRegistrationFiles;
		OstTraceFunctionExit0( CDATAOWNER_CDATAOWNER_DES_EXIT );
		}

	void CDataOwner::AddRegistrationFilesL(const TDesC& aFileName)
	/** Adds a registration file

	Adds a registration file to the list of registration files for this data owner

	@param aFileName the filename of the 
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_ADDREGISTRATIONFILESL_ENTRY );
		iRegistrationFiles->AppendL(aFileName);
		OstTraceFunctionExit0( CDATAOWNER_ADDREGISTRATIONFILESL_EXIT );
		}
		
	void CDataOwner::StartProcessIfNecessaryL()
	/**
	Start the active process
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_STARTPROCESSIFNECESSARYL_ENTRY );
		// Do we need to check that the process is started?
		if (iActiveInformation.iSupported && iActiveInformation.iActiveDataOwner)
			{
			// Get the list of currently running processes
			TBool processFound = EFalse;
			TFullName processName;
			TFindProcess findProcess;
			while (!processFound && (findProcess.Next(processName) == KErrNone))
				{
				RProcess process;
				CleanupClosePushL(process);
				if (process.Open(processName) == KErrNone) // Should we leave on any errors?
					{
					if (process.SecureId() == iSecureId)
						{
						// Process already exists - see if it's previuosly connected and has a current session
					    OstTraceExt1(TRACE_NORMAL, CDATAOWNER_STARTPROCESSIFNECESSARYL, "Process %S already exists - not starting", processName);
						TRAPD(err, iStatus = ipDataOwnerManager->ABServer().SessionReadyStateL(iSecureId));
						if (err == KErrNone)
							{
						    OstTraceExt2(TRACE_NORMAL, DUP1_CDATAOWNER_STARTPROCESSIFNECESSARYL, "Existing session for process %S has status %d", processName, iStatus);
							} // if
						else
							{
						    OstTraceExt1(TRACE_NORMAL, DUP2_CDATAOWNER_STARTPROCESSIFNECESSARYL, "Existing process %S hasn't yet connected to a session", processName);
							iStatus = EDataOwnerNotConnected;//ReadyState only check session state when this status not equal to 'EDataOwnerReadyNoImpl' and 'EDataOwnerReady' 
							} // else
						
						processFound = ETrue;
						} // if
					} // if
					
					CleanupStack::PopAndDestroy(&process);
				} // while
				
			// If the process is not started then we need to start it
			if (!processFound)
				{
				// Create the process
				TUidType uidType(KNullUid, KNullUid, iSecureId);
				RProcess process;
				CleanupClosePushL(process);
				TInt createErr = process.Create(iActiveInformation.iProcessName, KNullDesC, uidType);
				if (createErr != KErrNone)
					{
				    OstTraceExt2(TRACE_NORMAL, DUP3_CDATAOWNER_STARTPROCESSIFNECESSARYL, "Process %S failed to start(%d)", iActiveInformation.iProcessName, createErr);
					iStatus = EDataOwnerFailed;
					} // if
				else
					{
				    OstTraceExt1(TRACE_NORMAL, DUP4_CDATAOWNER_STARTPROCESSIFNECESSARYL, "Process %S started.", iActiveInformation.iProcessName);
					process.Resume();
					} // else
					
				CleanupStack::PopAndDestroy(&process);
				} // if
			} // if
		OstTraceFunctionExit0( CDATAOWNER_STARTPROCESSIFNECESSARYL_EXIT );
		}
		

	void CDataOwner::ParseFilesL()
	/** Parse the registration files

	@leave KErrGeneral data owner has no primary registration file
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_PARSEFILESL_ENTRY );
		if (!iFilesParsed)
			{
			TUint count = iRegistrationFiles->Count();
			TBool foundPrimaryFile = EFalse;
			while(count--)
				{
				const TDesC& fileName = (*iRegistrationFiles)[count];

			  // Determine if this is the primary file
				iPrimaryFile = (fileName.FindF(KPrimaryBackupRegistrationFile) != KErrNotFound);
				if (iPrimaryFile)
					{
					foundPrimaryFile = ETrue;
					}

				// Parse file

				OstTraceExt2(TRACE_NORMAL, CDATAOWNER_PARSEFILESL, "[0x%08x] - parsing reg file: %S...", iSecureId.iId, fileName);
				TRAPD(err, ParseFileL(fileName));
				if	(err == KErrNone)
					{
				    OstTrace1(TRACE_NORMAL, DUP1_CDATAOWNER_PARSEFILESL, "[0x%08x] - ...file parsed okay", iSecureId.iId);
					}
				else
					{
				    OstTraceExt2(TRACE_ERROR, DUP2_CDATAOWNER_PARSEFILESL, "[0x%08x] - ...*** PARSING FAILED *** - error: %d", iSecureId.iId, static_cast<TInt32>(err));
					User::Leave(err);
					}
				
				// Add the registration file to the exclude list
				CSelection* selection = CSelection::NewLC(EExclude, fileName);
				iPassiveSelections.AppendL(selection);
				CleanupStack::Pop(selection);
				}

			// Check that a primary file was found, as there must be one	
			if (!foundPrimaryFile)
				{
			    OstTrace0(TRACE_ERROR, DUP3_CDATAOWNER_PARSEFILESL, "Leave: KErrGeneral");
				User::Leave(KErrGeneral);
				} // if
			
			iFilesParsed = ETrue;
			} // if
		
		if (!iActiveInformation.iSupported && (iPassiveInformation.iSupported || iSystemInformation.iSupported))
			{
			iStatus = EDataOwnerReady;
			}
 		OstTraceFunctionExit0( CDATAOWNER_PARSEFILESL_EXIT );
 		}
		
	void CDataOwner::GetExpectedDataSizeL(TTransferDataType aTransferType,
										  TDriveNumber aDriveNumber, TUint& aSize)
	/** Gets the expected data size of the backkup.
	
	@param aTransferType the type of the transfer
	@param aDriveNumber the drive to check for files
	@param aSize on return the total size in bytes of the backup
	@leave KErrNotReady the snapshot has not been set
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_GETEXPECTEDDATASIZEL_ENTRY );
		aSize = 0;
		switch (aTransferType)
			{
		case EPassiveSnapshotData:
			{
			OstTraceExt1(TRACE_NORMAL, CDATAOWNER_GETEXPECTEDDATASIZEL, "EPassiveSnapshotData - aDriveNumber: %c", aDriveNumber + 'A');

            CDesCArray* files = new(ELeave) CDesC16ArrayFlat(KDesCArrayGranularity);
            CleanupStack::PushL(files);
		
			BuildFileListL(iPassiveSelections, aDriveNumber, aTransferType, EFalse, NULL, NULL, files);
			
			// DBMS file?
			AddDBMSFilesL(aDriveNumber, files, NULL);
			
			TUint count = files->Count();
			aSize = count * sizeof(TSnapshot);
			OstTraceExt2(TRACE_NORMAL, DUP1_CDATAOWNER_GETEXPECTEDDATASIZEL, "passive snapshot count: %d, expected size: %d", count, aSize);
			
			CleanupStack::PopAndDestroy(files);
			break;
			}
		case EPassiveBaseData:
		case EPassiveIncrementalData:
			{
			OstTraceExt1(TRACE_NORMAL, DUP2_CDATAOWNER_GETEXPECTEDDATASIZEL, "EPassiveBaseData/EPassiveIncrementalData - aDriveNumber: %c", aDriveNumber + 'A');

            RFileArray files;
			CleanupClosePushL(files);
			
			// Find all the files
			if (aTransferType == EPassiveBaseData)
				{
			    OstTrace0(TRACE_NORMAL, DUP3_CDATAOWNER_GETEXPECTEDDATASIZEL, "EPassiveBaseData");
				BuildFileListL(iPassiveSelections, aDriveNumber, aTransferType, EFalse, NULL, &files, NULL);
				
				// Do we need to add the DBMS file?
				AddDBMSFilesL(aDriveNumber, NULL, &files);
				} // if
			else
				{
			    OstTrace0(TRACE_NORMAL, DUP4_CDATAOWNER_GETEXPECTEDDATASIZEL, "EPassiveIncrementalData");

				// Do we have a snapshot?
				const TUint count = iSnapshots.Count();
				RSnapshots* pSnapshot = NULL;
				for (TInt x = 0; !pSnapshot && (x < count); x++)
					{
					if (iSnapshots[x]->iDriveNumber == aDriveNumber)
						{
						pSnapshot = &(iSnapshots[x]->iSnapshots);
						} // if
					} // for x
					
				BuildFileListL(iPassiveSelections, aDriveNumber, aTransferType, EFalse, pSnapshot, &files, NULL);
				
				// Do we need to add the DBMS file?
				AddDBMSFilesL(aDriveNumber, NULL, &files);
				} // else
			
			// Calculate the expected data size
			const TUint count = files.Count();
			OstTrace1(TRACE_NORMAL, DUP5_CDATAOWNER_GETEXPECTEDDATASIZEL, "passive file count: %d", count);
			aSize = (count * sizeof(TFileFixedHeader));
			for (TInt x = 0; x < count; x++)
				{
                const TEntry& fileEntry = files[x];
                const TInt fileSize = fileEntry.iSize;
                OstTraceExt2(TRACE_NORMAL, DUP6_CDATAOWNER_GETEXPECTEDDATASIZEL, "passive file: %S, size: %d", fileEntry.iName, fileSize);

				aSize += fileEntry.iName.Length();
				aSize += fileSize;
				}
			CleanupStack::PopAndDestroy(&files);
			break;
			}
		case EActiveBaseData:
		case EActiveIncrementalData:
			{
			OstTraceExt1(TRACE_NORMAL, DUP7_CDATAOWNER_GETEXPECTEDDATASIZEL, "EActiveBaseData/EActiveIncrementalData - aDriveNumber: %c", aDriveNumber + 'A');
			// Only request expected data size if it's for this data owner, not the proxies
			if (iActiveInformation.iSupported && iActiveInformation.iActiveDataOwner && (iActiveInformation.iActiveType != EProxyImpOnly))
				{
				ipDataOwnerManager->ABServer().GetExpectedDataSizeL(iSecureId, aDriveNumber, aSize);
				}
			else
				{
				aSize = 0;
				OstTrace1(TRACE_NORMAL, DUP8_CDATAOWNER_GETEXPECTEDDATASIZEL, "ACTIVE BASE - DO 0x%08x is PROXY, so setting size to 0!", iSecureId.iId);
				}
				
			} break;
		case EActiveSnapshotData:
			{
			OstTraceExt1(TRACE_NORMAL, DUP9_CDATAOWNER_GETEXPECTEDDATASIZEL, "EActiveSnapshotData - aDriveNumber: %c", aDriveNumber + 'A');
			aSize = 0;		// ABClient M class doesn't provide retrieval of snapshot data size
			} break;
		default:
		    OstTraceExt1(TRACE_ERROR, DUP10_CDATAOWNER_GETEXPECTEDDATASIZEL, "ERROR - UNSUPPORTED TYPE! => KErrNotSupported - aDriveNumber: %c", aDriveNumber + 'A');
			User::Leave(KErrNotSupported);
			} // switch

		OstTraceExt2(TRACE_NORMAL, DUP11_CDATAOWNER_GETEXPECTEDDATASIZEL, "size is: %d, data owner 0x%08x", static_cast<TUint32>(aSize), iSecureId.iId);
		OstTraceFunctionExit0( CDATAOWNER_GETEXPECTEDDATASIZEL_EXIT );
		}


	void CDataOwner::GetPublicFileListL(TDriveNumber aDriveNumber, RFileArray& aFiles)
	/** Gets the public file list

	Gets the public file list for the given drive
	@param aDriveNumber the drive to retrieve the public files for
	@param aFiles on return a list of public files
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_GETPUBLICFILELISTL_ENTRY );
		BuildFileListL(iPublicSelections, aDriveNumber, EPassiveBaseData, ETrue, NULL, &aFiles, NULL);
		OstTraceFunctionExit0( CDATAOWNER_GETPUBLICFILELISTL_EXIT );
		}
		
	
	void CDataOwner::GetRawPublicFileListL(TDriveNumber aDriveNumber, 
										   RRestoreFileFilterArray& aRestoreFileFilter)
	/** Gets the raw public file list 
	
	@param aDriveNumber the drive to return the list for
	@param aRestoreFileFilter on return the file filter
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_GETRAWPUBLICFILELISTL_ENTRY );
		// Convert drive number to letter
		TChar drive;
		TInt err = ipDataOwnerManager->GetRFs().DriveToChar(aDriveNumber, drive);
		LEAVEIFERROR(err, OstTrace1(TRACE_ERROR, CDATAOWNER_GETRAWPUBLICFILELISTL, "Leave: %d", err));
		
		const TUint count = iPublicSelections.Count();
		for (TInt x = 0; x < count; x++)
			{
			TBool include = (iPublicSelections[x]->SelectionType() == EInclude);
			TFileName filename;
			
			const TDesC& selectionName = iPublicSelections[x]->SelectionName();
			// Name
			TBool add = false;
			if ((selectionName.Length() > 1) && (selectionName[1] == KColon()[0]))
				{
				// It has a drive specified
				TInt drive;
				ipDataOwnerManager->GetRFs().CharToDrive(selectionName[0], drive);
				if (static_cast<TDriveNumber>(drive) == aDriveNumber)
					{
					add = true;
					filename.Append(selectionName);
					} // if
				} // if
			else if (selectionName[0] == KBackSlash()[0])
				{
					add = true;
					filename.Append(drive);
					filename.Append(KColon);
					filename.Append(selectionName);
				} // if
			else
				{
					filename.Append(drive);
					filename.Append(KColon);
					filename.Append(KBackSlash);
					filename.Append(selectionName);
				} // else
			
				if (add)
					{
					aRestoreFileFilter.AppendL(TRestoreFileFilter(include, filename));
					} // if
			} // for x
		OstTraceFunctionExit0( CDATAOWNER_GETRAWPUBLICFILELISTL_EXIT );
		}
		
	void CDataOwner::ProcessSupplyDataL(TDriveNumber aDriveNumber, TTransferDataType aTransferType, 
								 TDesC8& aBuffer, TBool aLastSection)
	/** Supply data to the data owner
	
	@param aDriveNumber the drive requesting data for
	@param aTransferType the type of transfer
	@param aBuffer the buffer containing the data
	@param aLastSection have we received all our information
	@leave KErrNotReady In the process of another call
	@leave KErrNotSupported Unsupported transfer type
	@leave KErrCorrupt If commands have been issued that violate the allowed sequence
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_PROCESSSUPPLYDATAL_ENTRY );
		TBURPartType burType = ipDataOwnerManager->BURType();
		OstTraceExt2(TRACE_NORMAL, CDATAOWNER_PROCESSSUPPLYDATAL, "drive: %c, aTransferType: %d", aDriveNumber + 'A', aTransferType);
		

		switch (aTransferType)
			{
			case EPassiveSnapshotData:
				{
				OstTrace1(TRACE_NORMAL, DUP1_CDATAOWNER_PROCESSSUPPLYDATAL, "Supplying passive snapshot data to data owner with SID 0x%08x", iSecureId.iId);
				// Check that no passive data has been received for a data owner that doesn't support it
				if (!iPassiveInformation.iSupported)
					{
				    OstTrace0(TRACE_ERROR, DUP2_CDATAOWNER_PROCESSSUPPLYDATAL, "State Error - Passive restore has been requested but isn't supported");
					User::Leave(KErrCorrupt);
					}
				
				// Check that no snapshot is supplied after backup data has been requested during a backup
				if (((burType == EBURBackupFull) || (burType == EBURBackupPartial)) && 
					(StateByDriveL(aDriveNumber).iPassiveBaseDataRequested || 
					 StateByDriveL(aDriveNumber).iPassiveIncDataRequested))
					{
				    OstTrace0(TRACE_ERROR, DUP3_CDATAOWNER_PROCESSSUPPLYDATAL, "State Error - Snapshot has been supplied after data has been requested");
					User::Leave(KErrCorrupt);
					}
					
				// Check that no snapshot is supplied for a data owner expecting base backup
				if (iPassiveInformation.iBaseBackupOnly)
					{
				    OstTrace0(TRACE_ERROR, DUP4_CDATAOWNER_PROCESSSUPPLYDATAL, "State Error - Snapshot data has been supplied for a base data owner");
					User::Leave(KErrCorrupt);
					}
					
				// Check that no snapshot data is provided after backup data has been supplied during a restore
				if (((burType == EBURRestorePartial) || (burType == EBURRestoreFull)) 
					&& (StateByDriveL(aDriveNumber).iPassiveBaseDataReceived || 
					    StateByDriveL(aDriveNumber).iPassiveIncDataReceived))
					{
				    OstTrace0(TRACE_ERROR, DUP5_CDATAOWNER_PROCESSSUPPLYDATAL, "State Error - Snapshot has been supplied after restore data has been supplied");
					User::Leave(KErrCorrupt);
					}
  				
				SupplyPassiveSnapshotDataL(aDriveNumber, aBuffer, aLastSection);
				
				if (aLastSection)
					{
					StateByDriveL(aDriveNumber).iPassiveSnapshotReceived = ETrue;
					}
				break;
				}
			case EPassiveBaseData:
			case EPassiveIncrementalData:
				{
				if (aTransferType == EPassiveBaseData)
					{
				    OstTrace1(TRACE_NORMAL, DUP6_CDATAOWNER_PROCESSSUPPLYDATAL, "Supplying passive base data to data owner with SID 0x%08x", iSecureId.iId);
					}
				else if (aTransferType == EPassiveIncrementalData)
					{
				    OstTrace1(TRACE_NORMAL, DUP7_CDATAOWNER_PROCESSSUPPLYDATAL, "Supplying passive inc data to data owner with SID 0x%08x", iSecureId.iId);
					}
				
				// Check that no passive data has been received for a data owner that doesn't support it
				if (!iPassiveInformation.iSupported)
					{
				    OstTrace0(TRACE_ERROR, DUP8_CDATAOWNER_PROCESSSUPPLYDATAL, "State Error - Passive restore data has been supplied but isn't supported");
					User::Leave(KErrCorrupt);
					}

				// Check that no incremental data has been received for a SID that doesn't support it
				if (iPassiveInformation.iBaseBackupOnly && (aTransferType == EPassiveIncrementalData))
					{
				    OstTrace0(TRACE_ERROR, DUP9_CDATAOWNER_PROCESSSUPPLYDATAL, "State Error - Incremental restore data has been received for a base only data owner");
					User::Leave(KErrCorrupt);
					}
					
				// Passive Base data should only have been provided once for a SID
				if ((aTransferType == EPassiveBaseData) && StateByDriveL(aDriveNumber).iPassiveBaseDataReceived)
					{
				    OstTrace0(TRACE_ERROR, DUP10_CDATAOWNER_PROCESSSUPPLYDATAL, "State Error - Data is being restored more than once to a DO");
					User::Leave(KErrCorrupt);
					}
				
				// A snapshot should already have been supplied if we're incremental
				if (!StateByDriveL(aDriveNumber).iPassiveSnapshotReceived && (aTransferType == EPassiveIncrementalData))
					{
				    OstTrace0(TRACE_ERROR, DUP11_CDATAOWNER_PROCESSSUPPLYDATAL, "State Error - Snapshot has not yet been supplied and should have whether we're base or inc");
					User::Leave(KErrCorrupt);
					}
				
				// If incremental data is being supplied, then base data must already have been supplied
				if ((aTransferType == EPassiveIncrementalData) && !StateByDriveL(aDriveNumber).iPassiveBaseDataReceived)
					{
				    OstTrace0(TRACE_ERROR, DUP12_CDATAOWNER_PROCESSSUPPLYDATAL, "State Error - Incremental data supplied before base data");
					User::Leave(KErrCorrupt);
					}
				
				SupplyPassiveBaseDataL(aDriveNumber, aBuffer, aLastSection);
				
				if ((aTransferType == EPassiveBaseData) && aLastSection)
					{
					StateByDriveL(aDriveNumber).iPassiveBaseDataReceived = ETrue;
					}
				
				if ((aTransferType == EPassiveIncrementalData) && aLastSection)
					{
					StateByDriveL(aDriveNumber).iPassiveIncDataReceived = ETrue;
					}
				break;
				}
			case EActiveSnapshotData:
				{
				OstTrace1(TRACE_NORMAL, DUP13_CDATAOWNER_PROCESSSUPPLYDATAL, "Supplying active snapshot data to data owner with SID 0x%08x", iSecureId.iId);
				
				// Check that no active data has been received for a data owner that doesn't support it
				if (!iActiveInformation.iSupported)
					{
				    OstTrace0(TRACE_ERROR, DUP14_CDATAOWNER_PROCESSSUPPLYDATAL, "State Error - Active snapshot data has been supplied for a DO that doesn't support it");
					User::Leave(KErrCorrupt);
					}

				// Check that no active data has been received for a data owner that doesn't support it
				if (!iActiveInformation.iSupportsIncremental)
					{
				    OstTrace0(TRACE_ERROR, DUP15_CDATAOWNER_PROCESSSUPPLYDATAL, "State Error - Active snapshot data has been supplied for a base only Data Owner");
					User::Leave(KErrCorrupt);
					}
				
				// Check that no snapshot is supplied after backup data has been requested during a backup
				if (((burType == EBURBackupFull) || (burType == EBURBackupPartial)) && StateByDriveL(aDriveNumber).iActiveBaseDataRequested)
					{
				    OstTrace0(TRACE_ERROR, DUP16_CDATAOWNER_PROCESSSUPPLYDATAL, "State Error - Active snapshot has been supplied after backup data has been requested");
					User::Leave(KErrCorrupt);
					}
					
				// Check that no snapshot data is provided after backup data has been supplied during a restore
				if (((burType == EBURRestorePartial) || (burType == EBURRestoreFull)) && StateByDriveL(aDriveNumber).iActiveBaseDataReceived)
					{
				    OstTrace0(TRACE_ERROR, DUP17_CDATAOWNER_PROCESSSUPPLYDATAL, "State Error - Active snapshot data has been supplied after restore data");
					User::Leave(KErrCorrupt);
					}

				ipDataOwnerManager->ABServer().SupplyDataL(iSecureId, aDriveNumber, aTransferType, 
					aBuffer, aLastSection);
				
				if (aLastSection)
					{
					StateByDriveL(aDriveNumber).iActiveSnapshotReceived = ETrue;
					}
				} break;
			case EActiveBaseData:
			case EActiveIncrementalData:
				{
				if (aTransferType == EActiveBaseData)
					{
				    OstTrace1(TRACE_NORMAL, DUP18_CDATAOWNER_PROCESSSUPPLYDATAL, "Supplying active base data to data owner with SID 0x%08x", iSecureId.iId);					
					}
				else if (aTransferType == EActiveIncrementalData)
					{
				    OstTrace1(TRACE_NORMAL, DUP19_CDATAOWNER_PROCESSSUPPLYDATAL, "Supplying active incremental data to data owner with SID 0x%08x", iSecureId.iId);
					}
				
				const TUint supportedProxyCount = iProxyInformationArray.Count();
				TInt offset = 0;
				
				// Only unpack from the first supply message
				if (StateByDriveL(aDriveNumber).iFirstActiveTransaction)
					{
					iCurrentProxy = 0;
					TInt proxyCountCheck = 0;
					UnpackTypeAdvance(proxyCountCheck, aBuffer, offset);
					StateByDriveL(aDriveNumber).iFirstActiveTransaction = EFalse;
					OstTrace1(TRACE_NORMAL, DUP20_CDATAOWNER_PROCESSSUPPLYDATAL, "Proxy Info : Unpacked TotalProxyCount = %d", proxyCountCheck);

					// If the backup stream specifies a different number of proxy's to the registration file,
					// then we're looking at different reg file versions. This isn't supported as far as proxy's
					// are concerned
					if (supportedProxyCount != proxyCountCheck)
						{
					    OstTrace0(TRACE_ERROR, DUP21_CDATAOWNER_PROCESSSUPPLYDATAL, "State Error - Number of proxies supported (reg file) differs from backed up data");
						User::Leave(KErrCorrupt);
						}

					// Check that no active data has been requested for a data owner that doesn't support it
					if ((!iActiveInformation.iSupported) && (supportedProxyCount == 0))
						{
						// No proxies or active data 
					    OstTrace0(TRACE_ERROR, DUP22_CDATAOWNER_PROCESSSUPPLYDATAL, "State Error - Active data has been received but this DO doesn't support Active/Proxies");
						User::Leave(KErrCorrupt);
						}
						
					// Reset proxy state information for this drive
					for (TInt numProxy=0; numProxy < supportedProxyCount; numProxy++)
						{
						ProxyStateByDriveL(aDriveNumber,numProxy) = TProxyStateByDrive(aDriveNumber,numProxy);
						}
					
					for (TInt numProxies=0;numProxies<iProxyInformationArray.Count();numProxies++)
						{
						iProxyInformationArray[numProxies].iDataRequested = 0;
						iProxyInformationArray[numProxies].iDataSupplied = 0;
						iProxyInformationArray[numProxies].iOpInProgress = ETrue;												
						}
					}

				OstTrace1(TRACE_NORMAL, DUP23_CDATAOWNER_PROCESSSUPPLYDATAL, "Supplying active base data of size = %d", aBuffer.Length());
				
				// Restore the proxy data first
				TBool currentBufferConsumed = EFalse;  
				while ( (iCurrentProxy < supportedProxyCount) && (!currentBufferConsumed))
					{
				    OstTraceExt2(TRACE_NORMAL, DUP24_CDATAOWNER_PROCESSSUPPLYDATAL, "Proxy Info : Unpacking proxy info %d of %d", iCurrentProxy + 1, supportedProxyCount);
					
					// Unpack the proxy's finished flag, len and sid if we are handling the proxy for the first time
					if ( iProxyInformationArray[iCurrentProxy].iDataSupplied == 0)
						{						
						UnpackTypeAdvance(iProxyInformationArray[iCurrentProxy].iOpInProgress, aBuffer, offset);						
						OstTrace1(TRACE_NORMAL, DUP25_CDATAOWNER_PROCESSSUPPLYDATAL, "Proxy Info : FinishedFlag = %d", iProxyInformationArray[iCurrentProxy].iOpInProgress);												
						UnpackTypeAdvance(iProxyInformationArray[iCurrentProxy].iDataRequested, aBuffer, offset);						
						OstTrace1(TRACE_NORMAL, DUP26_CDATAOWNER_PROCESSSUPPLYDATAL, "Proxy Info : ProxyDataStreamLength = %d", iProxyInformationArray[iCurrentProxy].iDataRequested);
						TSecureId 	proxySecureId;
						UnpackTypeAdvance(proxySecureId, aBuffer, offset);
						
						if ( iProxyInformationArray[iCurrentProxy].iSecureId.iId != proxySecureId.iId )
							{
						    OstTrace0(TRACE_ERROR, DUP38_CDATAOWNER_PROCESSSUPPLYDATAL, "Leave: KErrCorrupt");
							User::Leave(KErrCorrupt);
							}
							
						OstTrace1(TRACE_NORMAL, DUP27_CDATAOWNER_PROCESSSUPPLYDATAL, "Proxy Info : ProxySID = 0x%08x", proxySecureId.iId);
						}
		
					// Is no more data coming , either from the buffer manager or from the server
					TBool proxyFinished = iProxyInformationArray[iCurrentProxy].iOpInProgress && aLastSection;

					TInt dataLengthRemaining = iProxyInformationArray[iCurrentProxy].iDataRequested - iProxyInformationArray[iCurrentProxy].iDataSupplied;
					
					TInt currentBufferLen = 0;
					
					// The data remaining for this proxy is more than data in this buffer
					if (dataLengthRemaining >= aBuffer.Length()-offset )
						{
						
						// more data was expected but both server and data mgr have finished, then leave
						if  (proxyFinished && dataLengthRemaining > aBuffer.Length()-offset)
							{
						    OstTrace0(TRACE_ERROR, DUP39_CDATAOWNER_PROCESSSUPPLYDATAL, "Leave: KErrCorrupt");
							User::Leave(KErrCorrupt);
							}
							
						// use the buffer upto the end
						currentBufferLen = aBuffer.Length() - offset;
						currentBufferConsumed = ETrue;
						}
					else
						{
						// use the buffer upto the remaining length of this proxy
						currentBufferLen = dataLengthRemaining;
						}
					
					// Create a pointer to the data of this proxy 
					TPtrC8 buffer(aBuffer.Mid(offset, currentBufferLen));					
					iProxyInformationArray[iCurrentProxy].iDataSupplied +=  currentBufferLen;
					OstTrace1(TRACE_NORMAL, DUP28_CDATAOWNER_PROCESSSUPPLYDATAL, "iProxyConsumedLength = %d",iProxyInformationArray[iCurrentProxy].iDataSupplied);
					
					offset += currentBufferLen;	

					TBool proxyLastSection = EFalse;
					
					// If the data to send is the last section, set proxyLastSection with true.
					if ((iProxyInformationArray[iCurrentProxy].iOpInProgress == (TInt)ETrue) && (iProxyInformationArray[iCurrentProxy].iDataSupplied == iProxyInformationArray[iCurrentProxy].iDataRequested))
						{
					    OstTrace0(TRACE_NORMAL, DUP29_CDATAOWNER_PROCESSSUPPLYDATAL, "Last Section to Proxy");
						proxyLastSection = ETrue;
						}
					else
						{
						proxyLastSection = proxyFinished;
						}

					
					// Call the proxy and give it the restore data. 
					ipDataOwnerManager->ABServer().SupplyDataL(
									iProxyInformationArray[iCurrentProxy].iSecureId,
									aDriveNumber, 
									aTransferType, 
									buffer, 
									proxyLastSection,
									ProxyStateByDriveL(aDriveNumber,iCurrentProxy).iOpInProgress,
									iSecureId);
					
					
					// If the proxy still has data to send, record the fact to that the 
					// data server or datamanager can supply again.
					if (!proxyFinished)
						{
					    OstTrace0(TRACE_NORMAL, DUP30_CDATAOWNER_PROCESSSUPPLYDATAL, "Proxy Info : Multipart send not complete, expecting more proxy data");
						ProxyStateByDriveL(aDriveNumber,iCurrentProxy).iOpInProgress = ETrue;							
						}
					else
						{
					    OstTrace0(TRACE_NORMAL, DUP31_CDATAOWNER_PROCESSSUPPLYDATAL, "Proxy Info : Send complete");
						ProxyStateByDriveL(aDriveNumber,iCurrentProxy).iOpInProgress = EFalse;
						ProxyStateByDriveL(aDriveNumber,iCurrentProxy).iDataSupplied = ETrue;
	
						}				
					
					OstTraceExt2(TRACE_NORMAL, DUP32_CDATAOWNER_PROCESSSUPPLYDATAL, "Check proxyConsumedLength = %d & proxyTotalDataLength = %d",iProxyInformationArray[iCurrentProxy].iDataSupplied,iProxyInformationArray[iCurrentProxy].iDataRequested);
					if (iProxyInformationArray[iCurrentProxy].iDataSupplied == iProxyInformationArray[iCurrentProxy].iDataRequested)
						{
					    OstTrace0(TRACE_NORMAL, DUP33_CDATAOWNER_PROCESSSUPPLYDATAL, "Resetting internal variables");
						// when whole packet from server is read.						
						iProxyInformationArray[iCurrentProxy].iDataSupplied = 0;
						iProxyInformationArray[iCurrentProxy].iDataRequested = 0;
						}
					
					// Check 
					if ( (iProxyInformationArray[iCurrentProxy].iOpInProgress == (TInt)ETrue) && (iProxyInformationArray[iCurrentProxy].iDataSupplied == iProxyInformationArray[iCurrentProxy].iDataRequested) )
						{
					    OstTrace0(TRACE_NORMAL, DUP34_CDATAOWNER_PROCESSSUPPLYDATAL, "Proxy Finished");
						iCurrentProxy++;
						}
						
					} // while more proxies.

				// Active data can be sent under 2 circumstances, data for a proxy and data for an actual active client				
				if (iActiveInformation.iSupported && iActiveInformation.iActiveDataOwner && (offset < aBuffer.Size()))
					{
				    OstTrace0(TRACE_NORMAL, DUP35_CDATAOWNER_PROCESSSUPPLYDATAL, "State iActiveInformation.iSupported");					
					// Active Base data should only have been provided once for a SID
					if ((aTransferType == EActiveBaseData) && StateByDriveL(aDriveNumber).iActiveBaseDataReceived)
						{
					    OstTrace0(TRACE_ERROR, DUP36_CDATAOWNER_PROCESSSUPPLYDATAL, "State Error - Active restore data has been provided more than once for this DO");
						User::Leave(KErrCorrupt);
						}
					
					TPtrC8 buffer(aBuffer.Mid(offset));

					ipDataOwnerManager->ABServer().SupplyDataL(
								iSecureId,
								aDriveNumber,
								aTransferType,
								buffer,
								aLastSection,
								StateByDriveL(aDriveNumber).iOpInProgress);
					
					if (!aLastSection)
						{
						StateByDriveL(aDriveNumber).iOpInProgress = ETrue;
						}
					else 
						{
						StateByDriveL(aDriveNumber).iOpInProgress = EFalse;
						StateByDriveL(aDriveNumber).iFirstActiveTransaction = ETrue;
						if (aTransferType == EActiveBaseData)
							{
							StateByDriveL(aDriveNumber).iActiveBaseDataReceived = ETrue;
							}
						
						if (aTransferType == EActiveIncrementalData)
							{
							StateByDriveL(aDriveNumber).iActiveIncDataReceived = ETrue;
							}
						}
					}
				} break;
			default:
				{
				OstTrace0(TRACE_ERROR, DUP37_CDATAOWNER_PROCESSSUPPLYDATAL, "State Error - An unsupported transfer type has been supplied");
				User::Leave(KErrNotSupported);
				}
			} // switch
		OstTraceFunctionExit0( CDATAOWNER_PROCESSSUPPLYDATAL_EXIT );
		}
		
	void CDataOwner::SupplyDataL(TDriveNumber aDriveNumber, TTransferDataType aTransferType, 
								 TDesC8& aBuffer, TBool aLastSection)
	/** Supply data to the data owner
	
	@param aDriveNumber the drive requesting data for
	@param aTransferType the type of transfer
	@param aBuffer the buffer containing the data
	@param aLastSection have we received all our information
	@leave KErrNotReady In the process of another call
	@leave KErrNotSupported Unsupported transfer type
	@leave KErrCorrupt If commands have been issued that violate the allowed sequence
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_SUPPLYDATAL_ENTRY );
		OstTraceExt5(TRACE_NORMAL, CDATAOWNER_SUPPLYDATAL, "SID: 0x%08x, aDrive: %c, aTransferType: %d, aLastSection: %d, iState: %d", iSecureId.iId, static_cast<TInt8>(aDriveNumber + 'A'), static_cast<TInt32>(aTransferType), static_cast<TInt32>(aLastSection), static_cast<TInt32>(iState.iState));
		// Check our state
		if (!((iState.iState == ENone) ||
		     ((iState.iState == ESupply) && (iState.iDriveNumber == aDriveNumber) && 
		      (iState.iTransferType == aTransferType))))
			{
		    OstTrace0(TRACE_ERROR, DUP2_CDATAOWNER_SUPPLYDATAL, "Leave: KErrNotReady");
			User::Leave(KErrNotReady);			
			}
			
		// Set the state?
		if (iState.iState == ENone)
			{
			iState.iState = ESupply;
			iState.iDriveNumber = aDriveNumber;
			iState.iTransferType = aTransferType;
			} // if
			
		// What are we doing then?
		// We must trap any errors and rethrow them so we can reset our state
		TInt err = KErrNone;
		
		// Do we need to perform a cleanup before restore?
		if ((aTransferType == EPassiveBaseData) ||
		    (aTransferType == EPassiveIncrementalData) ||
		    (aTransferType == EActiveBaseData) ||
		    (aTransferType == EActiveIncrementalData))
			{
			TRAP(err, CleanupBeforeRestoreL(aDriveNumber));
			}
		if (err != KErrNone)
			{
		    OstTraceExt2(TRACE_NORMAL, DUP1_CDATAOWNER_SUPPLYDATAL, "Data owner 0x%08x, drive %d could not cleanup before restore", iSecureId.iId, static_cast<TUint32>(aDriveNumber));
			}

		TRAP(err, ProcessSupplyDataL(aDriveNumber, aTransferType, aBuffer, aLastSection));

		
		// Was there an error?
		if (err != KErrNone)
			{
			iState.iState = ENone;
			delete iBufferFileReader;
			iBufferFileReader = NULL;
			delete iBufferSnapshotReader;
			iBufferSnapshotReader = NULL;
			OstTrace1(TRACE_ERROR, DUP3_CDATAOWNER_SUPPLYDATAL, "Leave: %d", err);
			User::Leave(err);
			} // if
			     
		if (aLastSection) // If last section reset state
			{
			iState.iState = ENone;
			} // if		
		OstTraceFunctionExit0( CDATAOWNER_SUPPLYDATAL_EXIT );
		} // SupplyDataL
		
		
	void CDataOwner::ProcessRequestDataL(TDriveNumber aDriveNumber, TTransferDataType aTransferType, 
    		TPtr8& aBuffer, TBool& aLastSection)
    /**
    So that the TRAPD isn't massive, this switch statement has been moved to this function
    */
		{
        OstTraceFunctionEntry0( CDATAOWNER_PROCESSREQUESTDATAL_ENTRY );
        OstTraceExt4(TRACE_NORMAL, CDATAOWNER_PROCESSREQUESTDATAL, "aDrive: %c, aTransferType: %d, aBuffer.Ptr(): 0x%08x, aBuffer.Length(): %d", static_cast<TInt8>(aDriveNumber + 'A'), static_cast<TInt32>(aTransferType), reinterpret_cast<TInt32>(aBuffer.Ptr()), static_cast<TInt32>(aBuffer.Length()));

		switch (aTransferType)
			{
			case EPassiveSnapshotData:
				{
				OstTrace1(TRACE_NORMAL, DUP1_CDATAOWNER_PROCESSREQUESTDATAL, "Requesting passive snapshot data from data owner with SID 0x%08x", iSecureId.iId);

				// Check that no passive data has been requested for a data owner that doesn't support it
				if (!iPassiveInformation.iSupported)
					{
				    OstTrace0(TRACE_ERROR, DUP2_CDATAOWNER_PROCESSREQUESTDATAL, "State Error - Passive snapshot data has been requested for a non-passive data owner");
					User::Leave(KErrCorrupt);
					}
					
				// Check that snapshot data is only requested once
				if (StateByDriveL(aDriveNumber).iPassiveSnapshotRequested)
					{
				    OstTrace0(TRACE_ERROR, DUP3_CDATAOWNER_PROCESSREQUESTDATAL, "State Error - Passive snapshot data has been requested more than once");
					User::Leave(KErrCorrupt);
					}

				RequestPassiveSnapshotDataL(aDriveNumber, aBuffer, aLastSection);
				
				if (aLastSection)
					{
					StateByDriveL(aDriveNumber).iPassiveSnapshotRequested = ETrue;
					}
				break;
				}
			case EPassiveBaseData:
			case EPassiveIncrementalData:
				{
				if (aTransferType == EPassiveBaseData)
					{
				    OstTrace1(TRACE_NORMAL, DUP4_CDATAOWNER_PROCESSREQUESTDATAL, "Requesting passive base data from data owner with SID 0x%08x", iSecureId.iId);
					}
				else if (aTransferType == EPassiveIncrementalData)
					{
				    OstTrace1(TRACE_NORMAL, DUP5_CDATAOWNER_PROCESSREQUESTDATAL, "Requesting passive inc data from data owner with SID 0x%08x", iSecureId.iId);
					}

				// Check that no passive data has been requested for a data owner that doesn't support it
				if (!iPassiveInformation.iSupported)
					{
				    OstTrace0(TRACE_ERROR, DUP6_CDATAOWNER_PROCESSREQUESTDATAL, "State Error - Passive backup data has been requested for a non-passive data owner");
					User::Leave(KErrCorrupt);
					}

				// Check that if this is an incremental backup, complete snapshot data has been received
				if ((aTransferType == EPassiveIncrementalData) && !StateByDriveL(aDriveNumber).iPassiveSnapshotReceived)
					{
				    OstTrace0(TRACE_ERROR, DUP7_CDATAOWNER_PROCESSREQUESTDATAL, "State Error - Incremental data has been requested without a snapshot being supplied");
					User::Leave(KErrCorrupt);
					}
				
				// Check that Passive data has only been requested once for a Data Owner
				if (((aTransferType == EPassiveBaseData) && StateByDriveL(aDriveNumber).iPassiveBaseDataRequested) ||
					((aTransferType == EPassiveIncrementalData) && StateByDriveL(aDriveNumber).iPassiveIncDataRequested))
					{
				    OstTrace0(TRACE_ERROR, DUP8_CDATAOWNER_PROCESSREQUESTDATAL, "State Error - Passive data has been requested more than once for this data owner");
					User::Leave(KErrCorrupt);
					}
				
				// Check that for base backup, no snapshot data has been supplied
				if ((aTransferType == EPassiveBaseData) && StateByDriveL(aDriveNumber).iPassiveSnapshotReceived)
					{
				    OstTrace0(TRACE_ERROR, DUP9_CDATAOWNER_PROCESSREQUESTDATAL, "State Error - Snapshot data has been received for a base only data owner");
					User::Leave(KErrCorrupt);
					}
				
				// Check that only Base OR Incremental data is requested - not both
				if (((aTransferType == EPassiveBaseData) && StateByDriveL(aDriveNumber).iPassiveIncDataRequested) || 
					((aTransferType == EPassiveIncrementalData) && StateByDriveL(aDriveNumber).iPassiveBaseDataRequested))
					{
				    OstTrace0(TRACE_ERROR, DUP10_CDATAOWNER_PROCESSREQUESTDATAL, "State Error - Base and Incremental data have been requested in the same session");
					User::Leave(KErrCorrupt);
					}
				
				RequestPassiveDataL(aTransferType, aDriveNumber, aBuffer, aLastSection);
				
				if ((aTransferType == EPassiveBaseData) && aLastSection)
					{
					StateByDriveL(aDriveNumber).iPassiveBaseDataRequested = ETrue;
					}
				
				if ((aTransferType == EPassiveIncrementalData) && aLastSection)
					{
					StateByDriveL(aDriveNumber).iPassiveIncDataRequested = ETrue;
					}
				break;
				}
			case EActiveSnapshotData:
				{
				OstTrace1(TRACE_NORMAL, DUP11_CDATAOWNER_PROCESSREQUESTDATAL, "Requesting active snapshot data from data owner with SID 0x%08x", iSecureId.iId);

				// Check that active data hasn't been requested for a data owner that doesn't support it
				if (!iActiveInformation.iSupported)
					{
				    OstTrace0(TRACE_ERROR, DUP12_CDATAOWNER_PROCESSREQUESTDATAL, "State Error - Active snapshot data has been requested from a non-active data owner");
					User::Leave(KErrCorrupt);
					}

				// Check that no active snapshot data has been requested for a base only active data owner
				if (!iActiveInformation.iSupportsIncremental)
					{
				    OstTrace0(TRACE_ERROR, DUP13_CDATAOWNER_PROCESSREQUESTDATAL, "State Error - Active snapshot data has been requested from a base only data owner");
					User::Leave(KErrCorrupt);
					}

				// Check that the Active client has prepared it's data and is ready
				if (iStatus != EDataOwnerReady)
					{
				    OstTrace0(TRACE_ERROR, DUP14_CDATAOWNER_PROCESSREQUESTDATAL, "State Error - Active Snapshot data has been requested from a data owner that isn't ready");
					User::Leave(KErrNotReady);
					}
					
				// Check that snapshot data is only requested once
				if (StateByDriveL(aDriveNumber).iActiveSnapshotRequested)
					{
				    OstTrace0(TRACE_ERROR, DUP15_CDATAOWNER_PROCESSREQUESTDATAL, "State Error - Active Snapshot data has been requested more than once");
					User::Leave(KErrCorrupt);
					}
					
				// Request the snapshot data from the abclient
				ipDataOwnerManager->ABServer().RequestDataL(iSecureId, aDriveNumber, aTransferType, 
					aBuffer, aLastSection);
				
				if (aLastSection)
					{
					StateByDriveL(aDriveNumber).iActiveSnapshotRequested = ETrue;
					}
				} break;
			case EActiveBaseData:
			case EActiveIncrementalData:
				{
				if (aTransferType == EActiveBaseData)
					{
				    OstTrace1(TRACE_NORMAL, DUP16_CDATAOWNER_PROCESSREQUESTDATAL, "Requesting active base data from data owner with SID 0x%08x", iSecureId.iId);
					}
				else if (aTransferType == EActiveIncrementalData)
					{
				    OstTrace1(TRACE_NORMAL, DUP17_CDATAOWNER_PROCESSREQUESTDATAL, "Requesting active inc data from data owner with SID 0x%08x", iSecureId.iId);
					}

				TInt supportedProxyCount = iProxyInformationArray.Count();
				TInt offset = 0;

				// Prepend the number of proxies into the data stream
				if (StateByDriveL(aDriveNumber).iFirstActiveTransaction)
					{
					// Check that no active data has been requested for a data owner that doesn't support it
					if ((!iActiveInformation.iSupported) && (supportedProxyCount == 0))
						{
						// No proxies or active data 
					    OstTrace0(TRACE_ERROR, DUP18_CDATAOWNER_PROCESSREQUESTDATAL, "State Error - Active data has been requested from a non-active/no proxy data owner");
						User::Leave(KErrCorrupt);
						}
					
					StateByDriveL(aDriveNumber).iFirstActiveTransaction = EFalse;
					
					PackTypeAdvance(supportedProxyCount, aBuffer, offset);
					OstTrace1(TRACE_NORMAL, DUP19_CDATAOWNER_PROCESSREQUESTDATAL, "Proxy Info : Packing TotalProxyCount = %d", supportedProxyCount);

					aBuffer.SetLength(offset);			        
					
					// Reset proxy state information for this drive
					for (TInt numProxy=0; numProxy < supportedProxyCount; numProxy++)
						{
						ProxyStateByDriveL(aDriveNumber,numProxy) = TProxyStateByDrive(aDriveNumber,numProxy);
						}
					}
					
				// Proxy data is always at the beginning of the data block
				for (TInt index = 0; index < supportedProxyCount; index++)
					{
				    OstTraceExt2(TRACE_NORMAL, DUP20_CDATAOWNER_PROCESSREQUESTDATAL, "Proxy Info : Packing proxy info %d of %d", index + 1, supportedProxyCount);

					// Request data from each of the data owners that haven't yet been added
					// If the buffer's overflowed, then let the PC request again
					if (!ProxyStateByDriveL(aDriveNumber,index).iDataRequested && aLastSection)
						{
						if (static_cast<TUint>(aBuffer.MaxSize() - aBuffer.Size()) > (sizeof(TBool) + sizeof(TInt32) + sizeof(TSecureId)))
							{
							// Pack protocol into active stream [Proxy data length][Proxy SID][Proxy Data]
							// Set the descriptor to be maximum length and use the offset to determine where we're up to
							aBuffer.SetMax();
							
							// buffer for proxy data finished flag
							TPtr8 finishedBuf(aBuffer.MidTPtr(offset, sizeof(TBool)));
							offset += sizeof(TBool);
							
							// buffer for length
							TPtr8 lengthBuf(aBuffer.MidTPtr(offset, sizeof(TInt32)));
							offset += sizeof(TInt32);
							
							// buffer for the sid 
							TPtr8 sidBuf(aBuffer.MidTPtr(offset, sizeof(TSecureId)));
							offset += sizeof(TSecureId);
							
							// Create a buffer for the data
							TPtr8 buffer(aBuffer.MidTPtr(offset));
							
							// Call the proxy
							ipDataOwnerManager->ABServer().RequestDataL(
											iProxyInformationArray[index].iSecureId,
											aDriveNumber, 
											aTransferType, 
											buffer, 
											aLastSection, 
											ProxyStateByDriveL(aDriveNumber,index).iOpInProgress,
											iSecureId);
											
							TInt size = buffer.Size();

							// Write the proxy protocol block to the active backup data stream
							PackType(aLastSection, finishedBuf, 0);
							OstTrace1(TRACE_NORMAL, DUP21_CDATAOWNER_PROCESSREQUESTDATAL, "Proxy Info : FinishedFlag = %d", aLastSection);
							
							PackType(size, lengthBuf, 0);
							OstTrace1(TRACE_NORMAL, DUP22_CDATAOWNER_PROCESSREQUESTDATAL, "Proxy Info : ProxyStreamSize= %d", size);

							PackType(iProxyInformationArray[index].iSecureId, sidBuf, 0);
							OstTrace1(TRACE_NORMAL, DUP23_CDATAOWNER_PROCESSREQUESTDATAL, "Proxy Info : ProxySID = 0x%08x", iProxyInformationArray[index].iSecureId.iId);
							
							// Update the offset and main buffer size
							offset += size;
							aBuffer.SetLength(offset);
							
							// If the proxy still has data to send, record the fact to that the PC can request again
							if (!aLastSection)
								{
								ProxyStateByDriveL(aDriveNumber,index).iOpInProgress = ETrue;
								}
							else
								{
								ProxyStateByDriveL(aDriveNumber,index).iOpInProgress = EFalse;
								ProxyStateByDriveL(aDriveNumber,index).iDataRequested = ETrue;
								}
							}
						else
							{
							// If there's not enough room for the protocol info, then set the last section flag
							aLastSection = EFalse;
							}
						}
					}

				if (iActiveInformation.iSupported && iActiveInformation.iActiveDataOwner && (aBuffer.Size() < aBuffer.MaxLength()))
					{
					// Check that if this is a base backup, no snapshot has been provided
					if ((aTransferType == EActiveBaseData) && StateByDriveL(aDriveNumber).iActiveSnapshotReceived)
						{
					    OstTrace0(TRACE_ERROR, DUP24_CDATAOWNER_PROCESSREQUESTDATAL, "State Error - A snapshot has been provided before a request for base data");
						User::Leave(KErrCorrupt);
						}
					
					// Check that if this is an incremental backup that at least one complete snapshot has been sent
					if ((aTransferType == EActiveIncrementalData) && !StateByDriveL(aDriveNumber).iActiveSnapshotReceived)
						{
					    OstTrace0(TRACE_ERROR, DUP25_CDATAOWNER_PROCESSREQUESTDATAL, "State Error - No snapshot has been supplied, yet incremental data has been requested");
						User::Leave(KErrCorrupt);
						}
					
					// Check that only one (possibly multi-part) request of actual data is made to an active backup client
					if (((aTransferType == EActiveBaseData) && StateByDriveL(aDriveNumber).iActiveBaseDataRequested) || 
						((aTransferType == EActiveIncrementalData) && StateByDriveL(aDriveNumber).iActiveIncDataRequested))
						{
					    OstTrace0(TRACE_ERROR, DUP26_CDATAOWNER_PROCESSREQUESTDATAL, "State Error - Active data has been requested more than once (not counting multi-part)");
						User::Leave(KErrCorrupt);
						}
						
					// Check that only Base OR Incremental data is requested - not both
					if (((aTransferType == EActiveBaseData) && StateByDriveL(aDriveNumber).iActiveIncDataRequested) || 
						((aTransferType == EActiveIncrementalData) && StateByDriveL(aDriveNumber).iActiveBaseDataRequested))
						{
					    OstTrace0(TRACE_ERROR, DUP27_CDATAOWNER_PROCESSREQUESTDATAL, "State Error - Only active base or incremental data can be requested in the same session");
						User::Leave(KErrCorrupt);
						}

					// Create a buffer pointer allowing the client to fill the remainder of the buffer
					TInt currentBufferLength = aBuffer.Size();
					aBuffer.SetMax();
					
					TPtr8 buffer(aBuffer.MidTPtr(currentBufferLength));
					
					// Request data from the abclient
					ipDataOwnerManager->ABServer().RequestDataL(
									iSecureId,
									aDriveNumber,
									aTransferType, 
									buffer,
									aLastSection,
									StateByDriveL(aDriveNumber).iOpInProgress);

					aBuffer.SetLength(currentBufferLength + buffer.Size());

					// If the active data owner still has data to send, record the fact to that the PC can request again
					if (!aLastSection)
						{
						StateByDriveL(aDriveNumber).iOpInProgress = ETrue;
						}
					else 
						{
						StateByDriveL(aDriveNumber).iOpInProgress = EFalse;
						StateByDriveL(aDriveNumber).iFirstActiveTransaction = ETrue;
						if (aTransferType == EActiveBaseData)
							{
							StateByDriveL(aDriveNumber).iActiveBaseDataRequested = ETrue;
							}
						
						if (aTransferType == EActiveIncrementalData)
							{
							StateByDriveL(aDriveNumber).iActiveIncDataRequested = ETrue;
							}
						}
					}	// Active data owner
				} break;
			default:
				{
				OstTrace0(TRACE_ERROR, DUP29_CDATAOWNER_PROCESSREQUESTDATAL, "Leave: KErrNotSupported");
				User::Leave(KErrNotSupported);
				}
			} // switch

		OstTraceExt2(TRACE_NORMAL, DUP28_CDATAOWNER_PROCESSREQUESTDATAL, "aBuffer.Ptr(): 0x%08x, aBuffer.Length(): %d", reinterpret_cast<TInt32>(aBuffer.Ptr()), static_cast<TInt32>(aBuffer.Length()));
		OstTraceFunctionExit0( CDATAOWNER_PROCESSREQUESTDATAL_EXIT );
		}
		
    void CDataOwner::RequestDataL(TDriveNumber aDriveNumber, TTransferDataType aTransferType, 
    				  			  TPtr8& aBuffer, TBool& aLastSection)
    	{
    	OstTraceFunctionEntry0( CDATAOWNER_REQUESTDATAL_ENTRY );
    	aLastSection = ETrue;		// Set the last section to be true by default
    	
		// Check our state
		if (!((iState.iState == ENone) ||
		     ((iState.iState == ERequest) && (iState.iDriveNumber == aDriveNumber) && 
		      (iState.iTransferType == aTransferType))))
			{
		    OstTrace0(TRACE_ERROR, DUP1_CDATAOWNER_REQUESTDATAL, "Leave: KErrNotReady");
			User::Leave(KErrNotReady);			
			}
			
		// Set the state?
		if (iState.iState == ENone)
			{
			iState.iState = ERequest;
			iState.iDriveNumber = aDriveNumber;
			iState.iTransferType = aTransferType;
			}
			
		// What are we doing then?
		// We must trap any errors and rethrow them so we can reset our state
		TRAPD(err, ProcessRequestDataL(aDriveNumber, aTransferType, aBuffer, aLastSection));
		
		if (err != KErrNone)
			{
		    OstTraceExt4(TRACE_NORMAL, CDATAOWNER_REQUESTDATAL, "drive: %c:, aTransferType: %d, secureId: 0x%08x - ERROR: %d", static_cast<TInt8>('a' + aDriveNumber), static_cast<TInt32>(aTransferType), static_cast<TInt32>(iSecureId.iId), static_cast<TInt32>(err));
			iState.iState = ENone;
			delete iBufferFileWriter;
			iBufferFileWriter = NULL;
			delete iBufferSnapshotWriter;
			iBufferSnapshotWriter = NULL;
			OstTrace1(TRACE_ERROR, DUP2_CDATAOWNER_REQUESTDATAL, "Leave: %d", err);
			User::Leave(err);
			} // if
		
		if (aLastSection) // If last section reset state
			{
			iState.iState = ENone;
			} // if
    	OstTraceFunctionExit0( CDATAOWNER_REQUESTDATAL_EXIT );
    	} // RequestDataL
    	
    void CDataOwner::RestoreCompleteL()
    /** Indicate to the active client that the restore operation has been completed
    */
    	{
    	OstTraceFunctionEntry0( CDATAOWNER_RESTORECOMPLETEL_ENTRY );
    	// Find all of the drives that this data owner could have stored data on
    	TDriveList driveList;
    	GetDriveListL(driveList);
    	
    	for (TInt driveCountIndex = 0; driveCountIndex < KMaxDrives; driveCountIndex++)
    		{
    		if (driveList[driveCountIndex])
    			{
    			// If the particular drive is supported, then indicate that the restore is complete
    			ipDataOwnerManager->ABServer().RestoreCompleteL(iSecureId, static_cast<TDriveNumber>(driveCountIndex));
    			}
    		}
    	OstTraceFunctionExit0( CDATAOWNER_RESTORECOMPLETEL_EXIT );
    	}


	TSecureId CDataOwner::SecureId() const
	/** Get the secure id of the data owner

	@return the secure id of the data owner
	*/
		{
		return iSecureId;
		}
		
	TDataOwnerStatus CDataOwner::ReadyState()
	/** Gets the ready state of the data owner
	
	@return The ready state
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_READYSTATE_ENTRY );
		TDataOwnerStatus status = EDataOwnerReady;
		TInt proxyIndex = 0;
		const TUint proxyCount = iProxyInformationArray.Count();
		CDataOwner* pProxyDataOwner = NULL; // TRAPD forces us to use a pointer instead of ref
		
		while ((proxyIndex < proxyCount) && (status == EDataOwnerReady || status == EDataOwnerReadyNoImpl))
			{
			// For each proxy required, query for ready state
			TRAPD(err, pProxyDataOwner = &(ipDataOwnerManager->DataOwnerL(
				iProxyInformationArray[proxyIndex].iSecureId)));

			// If the proxy data owner doesn't exist - then error
			if (err == KErrNotFound)
				{
				status = EDataOwnerNotFound;
				}
			else
				{
				if (pProxyDataOwner->ActiveInformation().iActiveType != EActiveOnly)
					{
					// Get the status from each of the supported proxies
					status = pProxyDataOwner->ReadyState();
					proxyIndex++;					
					}
				else
					{
					status = EDataOwnerFailed;
					break;
					}

				}
			}

		
		// If this data owner has only proxy data to backup, then echo the state of the proxies
		if ((proxyCount > 0) && !iActiveInformation.iActiveDataOwner) // is passive
			{
			if (status == EDataOwnerReadyNoImpl) // proxy (eg.cent rep) is ready
				{
				iStatus = EDataOwnerReady;
				}
			else
				{
				iStatus = status;
				}
			}
			
		if ((iActiveInformation.iActiveDataOwner) && (iStatus != EDataOwnerReady) && (iStatus != EDataOwnerReadyNoImpl))
			{
			TRAPD(err, iStatus = ipDataOwnerManager->ABServer().SessionReadyStateL(iSecureId));
			if (err != KErrNone)
				{
				iStatus = EDataOwnerNotConnected;
				}
			}

		// If all of the proxies are ok, then set the status to be that of this data owner
		if (status == EDataOwnerReady || status == EDataOwnerReadyNoImpl)
			{
			status = iStatus;
			}
		
		
		OstTraceExt2(TRACE_NORMAL, CDATAOWNER_READYSTATE, "Ready status for data owner 0x%08x is %d", iSecureId.iId, static_cast<TInt32>(status));
			
		OstTraceFunctionExit0( CDATAOWNER_READYSTATE_EXIT );
		return status;
		}
		
	void CDataOwner::SetReadyState(TDataOwnerStatus aDataOwnerStatus)
	/**
	Set upon a ConfirmReadyForBUR IPC call from an active backup client
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_SETREADYSTATE_ENTRY );
		OstTraceExt2(TRACE_NORMAL, CDATAOWNER_SETREADYSTATE, "Setting ready state of data owner 0x%08x to %d", iSecureId.iId, static_cast<TInt32>(aDataOwnerStatus));
		iStatus = aDataOwnerStatus;
		if (aDataOwnerStatus == EDataOwnerReady && iActiveInformation.iActiveType == EProxyImpOnly)
			{
			iStatus = EDataOwnerReadyNoImpl;
			}
		OstTraceFunctionExit0( CDATAOWNER_SETREADYSTATE_EXIT );
		}

	TCommonBURSettings CDataOwner::CommonSettingsL()
	/** Get the common settings of the data owner

	@pre CDataOwner::ParseFilesL() must have been called
	@return the common settings of the data owner
	@leave KErrNotReady if CDataOwner::ParseFilesL() not called
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_COMMONSETTINGSL_ENTRY );
		OstTraceExt2(TRACE_NORMAL, CDATAOWNER_COMMONSETTINGSL, "sid: 0x%08x, iFilesParsed: %d", iSecureId.iId, static_cast<TInt32>(iFilesParsed));
		if (!iFilesParsed)
			{
		    OstTrace0(TRACE_ERROR, DUP6_CDATAOWNER_COMMONSETTINGSL, "Leave: KErrNotReady");
			User::Leave(KErrNotReady);
			}
			
		OstTraceExt2(TRACE_NORMAL, DUP1_CDATAOWNER_COMMONSETTINGSL, "Active Supported: %d, proxyCount: %d", iActiveInformation.iSupported, iProxyInformationArray.Count());
		TCommonBURSettings settings = ENoOptions;
		if (iActiveInformation.iSupported || iProxyInformationArray.Count())
			{
			settings |= EActiveBUR;
			} // if

		OstTrace1(TRACE_NORMAL, DUP2_CDATAOWNER_COMMONSETTINGSL, "Passive Supported: %d", iPassiveInformation.iSupported);
		if (iPassiveInformation.iSupported)
			{
			settings |= EPassiveBUR;
			}

		OstTrace1(TRACE_NORMAL, DUP3_CDATAOWNER_COMMONSETTINGSL, "System Supported: %d", iSystemInformation.iSupported);
		if (iSystemInformation.iSupported)
			{
			settings |= EHasSystemFiles;
			}

		OstTraceExt2(TRACE_NORMAL, DUP4_CDATAOWNER_COMMONSETTINGSL, "SelActive: %d, SelPassive: %d", iActiveInformation.iSupportsSelective, iPassiveInformation.iSupportsSelective);
		if (iActiveInformation.iSupportsSelective && iPassiveInformation.iSupportsSelective)
			{
			settings |= ESupportsSelective;
			}

		OstTrace1(TRACE_NORMAL, DUP5_CDATAOWNER_COMMONSETTINGSL, "Reboot required: %d", iRestoreInformation.iRequiresReboot);
		if (iRestoreInformation.iRequiresReboot)
			{
			settings |= ERequiresReboot;
			}

		OstTraceFunctionExit0( CDATAOWNER_COMMONSETTINGSL_EXIT );
		return settings;
		}

	TPassiveBURSettings CDataOwner::PassiveSettingsL()
	/** Get the passive settings of the data owner

	@pre CDataOwner::ParseFilesL() must have been called
	@return the passive settings of the data owner
	@leave KErrNotReady if CDataOwner::ParseFilesL() not called
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_PASSIVESETTINGSL_ENTRY );
		if (!iFilesParsed)
			{
		    OstTrace0(TRACE_ERROR, CDATAOWNER_PASSIVESETTINGSL, "Leave: KErrNotReady");
			User::Leave(KErrNotReady);
			}
		
		TPassiveBURSettings settings = ENoPassiveOptions;
		if (iPassiveInformation.iSupported)
			{
			if (iPassiveInformation.iDeleteBeforeRestore)
				{
				settings |= EDeleteBeforeRestore;
				} // if
			if (!iPassiveInformation.iBaseBackupOnly)
				{
				settings |= EPassiveSupportsInc;
				} // if
			} // if
		if (iPublicInformation.iSupported)
			{
			settings |= EHasPublicFiles;
			} // if
			
			
		OstTraceFunctionExit0( CDATAOWNER_PASSIVESETTINGSL_EXIT );
		return settings;
		}

	TActiveBURSettings CDataOwner::ActiveSettingsL()
	/** Get the active settings of the data owner

	@pre CDataOwner::ParseFilesL() must have been called
	@return the active settings of the data owner
	@leave KErrNotReady if CDataOwner::ParseFilesL() not called
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_ACTIVESETTINGSL_ENTRY );
		if (!iFilesParsed)
			{
		    OstTrace0(TRACE_ERROR, CDATAOWNER_ACTIVESETTINGSL, "Leave: KErrNotReady");
			User::Leave(KErrNotReady);
			}
			
		TActiveBURSettings settings = ENoActiveOptions;
		if (iActiveInformation.iSupported)
			{
			if (iActiveInformation.iRequiresDelayToPrepareData)
				{
				settings |= EDelayToPrepareData;
				} // if
			if (iActiveInformation.iSupportsIncremental)
				{
				settings |= EActiveSupportsInc;
				} // if
			} // if

		OstTraceFunctionExit0( CDATAOWNER_ACTIVESETTINGSL_EXIT );
		return settings;
		}
		
	/**
	Get ActiveInformation of the data owner
	
	@return TActiveInformation active information
	*/
	TActiveInformation CDataOwner::ActiveInformation()
		{
		return iActiveInformation;
		}

	void CDataOwner::GetDriveListL(TDriveList& aDriveList)
	/** Get the drive list for the data owner

	@pre CDataOwner::ParseFilesL() must have been called
	@return the active settings of the data owner
	@leave KErrNotReady if CDataOwner::ParseFilesL() not called
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_GETDRIVELISTL_ENTRY );
		OstTraceExt2(TRACE_NORMAL, CDATAOWNER_GETDRIVELISTL, "SID: 0x%08x, iFilesParsed: %d", iSecureId.iId, static_cast<TInt32>(iFilesParsed));
		if (!iFilesParsed)
			{
		    OstTrace0(TRACE_ERROR, DUP13_CDATAOWNER_GETDRIVELISTL, "Leave: KErrNotReady");
			User::Leave(KErrNotReady);
			}

		// Get the list of available drives, dont return drives that dont exist.
		TDriveList existingDrives;
		const TInt error = ipDataOwnerManager->GetRFs().DriveList(existingDrives);
        if  ( error != KErrNone )
            {
            OstTrace1(TRACE_NORMAL, DUP1_CDATAOWNER_GETDRIVELISTL, "couldnt get drive list: %d", error);
            }
        LEAVEIFERROR(error, OstTrace1(TRACE_ERROR, DUP12_CDATAOWNER_GETDRIVELISTL, "Leave: %d", error));
		
		// We now no longer return the Z drive, it has been decided that the Z drive will always be the
		// ROM. Backing up and restoring the ROM drive should not be possible, as what is the point
		
		TDriveList notToBackup = ipDataOwnerManager->Config().ExcludeDriveList();
		
		for (TInt i = 0; i < KMaxDrives; i++)
			{
			if (notToBackup[i]) // if this drive is set
				{
				// don't include this drive
				existingDrives[i] = EFalse;
				}
			}
		
		// If we do active backup or dbms backup then we
		// have to say all drives
		if ((iActiveInformation.iSupported) || (iDBMSSelections.Count()))
			{
		    OstTrace0(TRACE_NORMAL, DUP2_CDATAOWNER_GETDRIVELISTL, "active DO, so using all existing drives");
			aDriveList = existingDrives;		
			} // if
		else
			{
			// See where we have files?
			TBool allDrives = EFalse;
            				
     		// Reset drives passed in
			aDriveList.SetLength(KMaxDrives);
			aDriveList.FillZ();
			
			// Loop through passive files
			TInt count = iPassiveSelections.Count();
			OstTrace1(TRACE_NORMAL, DUP3_CDATAOWNER_GETDRIVELISTL, "checking %d passive file entries...", count);
			for (TInt x = 0; !allDrives &&  x < count; x++)
				{
                const TDesC& selection = iPassiveSelections[x]->SelectionName();
                if (iPassiveSelections[x]->SelectionType() != EExclude)
                	{
	                TInt drive = GetDrive(selection);
							
					if (drive == -1)
						{
					    OstTraceExt3(TRACE_NORMAL, DUP4_CDATAOWNER_GETDRIVELISTL, "passive[%2d/%2d] => all drives (no specific drive letter) - fullName: %S", x+1, count, selection);
						allDrives = ETrue;
						}
					else if (existingDrives[drive] != 0)
						{
					    OstTraceExt4(TRACE_NORMAL, DUP5_CDATAOWNER_GETDRIVELISTL, "passive[%2d/%2d] => drive: %c, fullName: %S", x+1, count, drive + 'A', selection);
						aDriveList[drive] = ETrue;
						}
                	}

				} // for

			OstTrace0(TRACE_NORMAL, DUP6_CDATAOWNER_GETDRIVELISTL, " ");
					
			// Loop through public files
			count = iPublicSelections.Count();
			OstTrace1(TRACE_NORMAL, DUP7_CDATAOWNER_GETDRIVELISTL, "checking %d public file entries...", count);

            for (TInt x = 0; !allDrives &&  (x < count); x++)
				{
                const TDesC& selection = iPublicSelections[x]->SelectionName();
                if (iPublicSelections[x]->SelectionType() != EExclude)
                	{
					TInt drive = GetDrive(selection);
						
					if (drive == -1)
						{
					    OstTraceExt3(TRACE_NORMAL, DUP8_CDATAOWNER_GETDRIVELISTL, "public[%2d/%2d] => all drives (no specific drive letter) - fullName: %S", x+1, count, selection);
						allDrives = ETrue;
						}
					else if (existingDrives[drive] != 0)
						{
					    OstTraceExt4(TRACE_NORMAL, DUP9_CDATAOWNER_GETDRIVELISTL, "public[%2d/%2d] => drive: %c, fullName: %S", x+1, count, drive + 'A', selection);
						aDriveList[drive] = ETrue;
						}
                	}
				} // for
					
			if (allDrives)
				{
			    OstTrace0(TRACE_NORMAL, DUP10_CDATAOWNER_GETDRIVELISTL, "using all drives!");
				aDriveList = existingDrives;
				} // if
			} // else

		TBuf<256> drivePrint;
		//
		for(TInt i=0; i<KMaxDrives; i++)
			{
			if	(aDriveList[i] != 0)
				{
				const TDriveUnit driveUnit(i);
				const TDriveName name(driveUnit.Name());
				drivePrint.Append(name);
				if	(i < KMaxDrives - 1)
					{
					drivePrint.Append(_L(", "));
					}
				}
			}

		OstTraceExt2(TRACE_NORMAL, DUP11_CDATAOWNER_GETDRIVELISTL, "SID: 0x%08x, supports drives: %S", iSecureId.iId, drivePrint);
		OstTraceFunctionExit0( CDATAOWNER_GETDRIVELISTL_EXIT );
		}

	void CDataOwner::SetBackedUpAsPartial(TBool aPartial)
	/**
	Inform's the data owner that upon a partial backup, this DO is to be backed up
	*/
		{
		iBackupAsPartial = aPartial;
		}
		
	TBool CDataOwner::PartialAffectsMe() const
	/**
	Accessor to discover whether or not the sbe client has specified this Data Owner to be backed 
	up as part of a partial backup
	
	@return ETrue if this data owner has been requested to backup as partial
	*/
		{
		return iBackupAsPartial;
		}

	void CDataOwner::ParseFileL(const TDesC& aFileName)
	/** Parse a given registration file

	@param aFileName the registration file to parse
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_PARSEFILEL_ENTRY );
		OstTraceExt2(TRACE_NORMAL, CDATAOWNER_PARSEFILEL, "aFileName: %S, iPrimaryFile: %d", aFileName, iPrimaryFile);
		
		PrivatePathL(aFileName);
		// Parse the file
		ipDataOwnerManager->ParserProxy().ParseL(aFileName, *this);
		OstTraceFunctionExit0( CDATAOWNER_PARSEFILEL_EXIT );
		}
		
	void CDataOwner::PrivatePathL(const TDesC& aFileName)
	/** Get the private path
	@param aPath The path to extract the drive from
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_PRIVATEPATHL_ENTRY );
		delete iPrivatePath;
  		TParsePtrC parse(aFileName);
  		iPrivatePath = parse.Path().AllocL();
		OstTraceFunctionExit0( CDATAOWNER_PRIVATEPATHL_EXIT );
		}

	TInt CDataOwner::GetDrive(const TDesC& aPath) const
	/** Gets the drive relating to a path.
	
	@param aPath The path to extract the drive from
	@return A TDriveNumber or -1 if a drive is not specified
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_GETDRIVE_ENTRY );
		TInt ret = KErrNotFound;
		
		if (aPath.Length() > 0)
			{
			if (ipDataOwnerManager->GetRFs().CharToDrive(static_cast<TChar>(aPath[0]).GetLowerCase(), ret) != KErrNone)
				{
				ret = KErrNotFound;
				} // if			
			}

		OstTraceFunctionExit0( CDATAOWNER_GETDRIVE_EXIT );
		return ret;
		}
		
	void CDataOwner::BuildFileListL(const RSelections& aFileSelection, 
									const TDriveNumber aDriveNumber,
									const TTransferDataType aTransferType,
									const TBool aIsPublic,
									RSnapshots* apSnapshots,
								    RFileArray* apFileEntries,
								    CDesCArray* apFileNames)
	/** Builds a file list.
	
	Builds a file list for a given selection.
	
	@param aFileSelection the selection
	@param aDriveNumber The drive that the file resides on
	@param aTransferType The type of the transfer
	@param aIsPublic Are we building a public file list
	@param apSnapshots A snapshot to compare files against
	@param apFileEntries Array of file info's to populate
	@param apFileNames Array of file names to populate
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_BUILDFILELISTL_ENTRY );
		TInt count = aFileSelection.Count();
		OstTraceExt4(TRACE_NORMAL, CDATAOWNER_BUILDFILELISTL, "aDriveNumber: %c, count: %d, aIsPublic: %d, aTransferType: %d", static_cast<TInt8>(aDriveNumber + 'A'), static_cast<TInt32>(count), static_cast<TInt32>(aIsPublic), static_cast<TInt32>(aTransferType));
		// Split selections into include and exclude
		RArray<TPtrC> include;
		CleanupClosePushL(include);
		RArray<TPtrC> exclude;
		CleanupClosePushL(exclude);
		// sort the snapshost to speed up IsNewerL()
		if (apSnapshots)
			{
			apSnapshots->Sort(CSnapshot::Compare);
			}	

		OstTrace0(TRACE_NORMAL, DUP1_CDATAOWNER_BUILDFILELISTL, "file selection listing...:");
		for (TInt x = 0; x < count; x++)
			{
            const TDesC& selectionName = aFileSelection[x]->SelectionName();
            OstTraceExt3(TRACE_NORMAL, DUP2_CDATAOWNER_BUILDFILELISTL, "selection[%03d]: %S, type: %d", x, selectionName, aFileSelection[x]->SelectionType());
			if (aFileSelection[x]->SelectionType() == EInclude)
				{
				include.AppendL(selectionName);
				} // if
			else
				{
				exclude.AppendL(selectionName);
				} // else
			} // for x
			
		// Loop through all includes
		count = include.Count();
		OstTrace0(TRACE_NORMAL, DUP3_CDATAOWNER_BUILDFILELISTL, "include listing...:");
        TFileName* fileName = new(ELeave) TFileName();
        CleanupStack::PushL(fileName);
		for (TInt x = 0; x < count; x++)
			{
			fileName->Zero();
			TChar drive;
			TInt err = ipDataOwnerManager->GetRFs().DriveToChar(aDriveNumber, drive);
			LEAVEIFERROR(err, OstTrace1(TRACE_ERROR, DUP14_CDATAOWNER_BUILDFILELISTL, "Leave: %d", err));

            const TDesC& includeEntry( include[x] );
            OstTraceExt2(TRACE_NORMAL, DUP4_CDATAOWNER_BUILDFILELISTL, "entry[%03d] is: %S", x, includeEntry);
            
            // See if the drive is specified
			if (includeEntry[0] == KBackSlash()[0])
				{
				// Add the drive
				fileName->Append(drive);
				fileName->Append(KColon);
				fileName->Append(includeEntry);
				}
			else if (static_cast<TChar>(includeEntry[0]).GetLowerCase() == drive.GetLowerCase())
				{
				fileName->Copy(includeEntry);
				} // else

			
			OstTraceExt2(TRACE_NORMAL, DUP5_CDATAOWNER_BUILDFILELISTL, "entry[%03d] filename is therefore: %S", x, *fileName);
			if (fileName->Length() > 0)
				{
				
				// Check to see if fileName is just a drive(we cant get an entry)
				TBool isDrive = EFalse;
				if ((fileName->MatchF(KDrive) != KErrNotFound) ||
				    (fileName->MatchF(KDriveAndSlash) != KErrNotFound))
					{
					isDrive = ETrue;
					OstTrace0(TRACE_NORMAL, DUP6_CDATAOWNER_BUILDFILELISTL, "filename is a drive");
					} // if
					
				TEntry entry;
				TBool isEntry = EFalse;
				if (!isDrive)
					{
					TInt err = ipDataOwnerManager->GetRFs().Entry(*fileName, entry);
					OstTrace1(TRACE_NORMAL, DUP7_CDATAOWNER_BUILDFILELISTL, "get entry error: %d", err);
					entry.iName = *fileName;
					switch (err)
						{
					case KErrNone:
						isEntry = ETrue;
						break;
					case KErrNotFound:
					case KErrPathNotFound:
					case KErrBadName:
						break;
					default:
					    OstTrace1(TRACE_ERROR, DUP13_CDATAOWNER_BUILDFILELISTL, "Leave: %d", err);
						User::Leave(err);
						} // switch
					} // if
					
				if (isDrive || (isEntry && entry.IsDir()))
					{
				    OstTrace0(TRACE_NORMAL, DUP8_CDATAOWNER_BUILDFILELISTL, "parsing directory...");
					ParseDirL(*fileName, exclude, aTransferType, aIsPublic, apSnapshots, apFileEntries, apFileNames);

                    if  (apFileNames)
                        {
                        const TInt fNameCount = apFileNames->Count();
                        for(TInt k=0; k<fNameCount; k++)
                            {
                            const TDesC& fileName = (*apFileNames)[k];
                            OstTraceExt2(TRACE_NORMAL, DUP9_CDATAOWNER_BUILDFILELISTL, "directory entry[%03d] %S", k, fileName);
                            }
                        }

                    OstTrace0(TRACE_NORMAL, DUP10_CDATAOWNER_BUILDFILELISTL, "end of parsing directory");
					} // if
				else
					{
					if (isEntry)
						{
                        const TBool isExcluded = IsExcluded(aIsPublic, *fileName, exclude);
						if (!isExcluded)
							{
							TInt err = KErrNone;
							TBool newer = EFalse;
							if (apSnapshots && (aTransferType == EPassiveIncrementalData))
								{
								TRAP(err, IsNewerL(*fileName, entry, apSnapshots, newer));
								} // if
							if (!apSnapshots || 
							    (aTransferType == EPassiveBaseData) || 
							    newer || 
							    (err != KErrNone))
								{
							    OstTraceExt1(TRACE_NORMAL, DUP11_CDATAOWNER_BUILDFILELISTL, "adding fully verified file: %S", *fileName);
								if (apFileEntries)
									{
									// Add to list of files
									apFileEntries->AppendL(entry);
									} // if
								
								if (apFileNames)
									{
									apFileNames->AppendL(*fileName);
									} // else
								} // if
							} // if
                        else
                            {
                            OstTrace0(TRACE_NORMAL, DUP12_CDATAOWNER_BUILDFILELISTL, "file is excluded!");
                            }
						} // if
					} // else
				} // if
			} // for x
		CleanupStack::PopAndDestroy(fileName);
		CleanupStack::PopAndDestroy(&exclude);
		CleanupStack::PopAndDestroy(&include);        
		OstTraceFunctionExit0( CDATAOWNER_BUILDFILELISTL_EXIT );
		}

	void CDataOwner::ParseDirL(const TDesC& aDirName, 
							   const RArray<TPtrC>& aExclude,
							   const TTransferDataType aTransferType,
							   const TBool aIsPublic,
							   RSnapshots* apSnapshots,
							   RFileArray* apFileEntries,
							   CDesCArray* apFileNames)
	/** Parses a directory for files.
	
	Parses the given directory for files. The function is called recursivily if a directory is found.
	
	@param aDirName the directory to search
	@param aExclude a list of directories or files to exclude
	@param apFileEntries Array of file entries to populate
	@param apFileNames Array of filenames to populate
	*/							   
		{
		OstTraceFunctionEntry0( CDATAOWNER_PARSEDIRL_ENTRY );
		CDir* pFiles = NULL;
		
		// This function requires a / on the end otherwise it does not work!
		TFileName* path = new(ELeave) TFileName(aDirName);
		CleanupStack::PushL(path);
		
		if ((*path)[path->Length() - 1] != KBackSlash()[0])
			{
			path->Append(KBackSlash);
			}
		
		TInt err = ipDataOwnerManager->GetRFs().GetDir(*path, KEntryAttMatchMask, ESortNone, pFiles);
		if ((err != KErrNone) && (err != KErrNotFound)) // Do we need to leave?
			{
		    OstTrace1(TRACE_ERROR, CDATAOWNER_PARSEDIRL, "Leave: %d", err);
			User::Leave(err);
			} // if
		
		CleanupStack::PushL(pFiles);
		
		// sort the snapshost to speed up IsNewerL()
		if (apSnapshots)
			{
			apSnapshots->Sort(CSnapshot::Compare);
			}
		
		TUint count = pFiles->Count();
		
		if (count==0)
	 		{
 			// empty directory			
 			TEntry entry;
 			TInt err = ipDataOwnerManager->GetRFs().Entry(*path, entry);
 			entry.iName = *path;
 			if (entry.IsDir() && (!IsExcluded(aIsPublic, entry.iName, aExclude)))
 				{
				// append empty directory entry to the list
 				entry.iSize = 0;
 				if (apFileEntries)
 					{
 					apFileEntries->AppendL(entry);
 					} 
 				if (apFileNames)
 					{
 					apFileNames->AppendL(entry.iName);
 					} 
 				}	
 			}

		TFileName* fileName = new(ELeave) TFileName();
		CleanupStack::PushL(fileName);
		
		while(count--)
			{
			TEntry entry((*pFiles)[count]); 
			
			fileName->Zero();
			// Build full path
			fileName->Append(*path);
			fileName->Append(entry.iName);
			entry.iName = *fileName;
			
			if (!IsExcluded(aIsPublic, entry.iName, aExclude))
				{
				if (entry.IsDir())
					{
					ParseDirL(entry.iName, aExclude, aTransferType, aIsPublic, apSnapshots, apFileEntries, apFileNames);
					} // if
				else
					{
					TInt err = KErrNone;
					TBool newer = EFalse;
					if (apSnapshots && (aTransferType == EPassiveIncrementalData))
						{
						TRAP(err, IsNewerL(entry.iName, entry, apSnapshots, newer));
						} // if
					if (!apSnapshots ||
					    (aTransferType == EPassiveBaseData) || 
					    newer || 
					    (err != KErrNone))
						{
						if (apFileEntries)
							{
							// Add to list of files
							apFileEntries->AppendL(entry);
							} // if
						
						if (apFileNames)
							{
							apFileNames->AppendL(entry.iName);
							} // else
						} // if
					} // else
				} // if
			} // while
			
		// Cleanup
		CleanupStack::PopAndDestroy(fileName);
		CleanupStack::PopAndDestroy(pFiles);
		CleanupStack::PopAndDestroy(path);
		OstTraceFunctionExit0( CDATAOWNER_PARSEDIRL_EXIT );
		}


	void CDataOwner::GetNextPublicFileL(TBool aReset, TDriveNumber aDriveNumber, TEntry& aEntry)
	/** Gets the next public file associated with the data owner

	@param aReset set true to start reading from the beginning of the list
	@param aDriveNumber the drive to retrieve the public files for
	@param aEntry on return the next entry in the list, an empty entry indicates the end of the list has been reached
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_GETNEXTPUBLICFILEL_ENTRY );
		TInt stackCount;
		TFileName fileName;
		TBool endOfList = EFalse;
		TBool gotEntry = EFalse;
		TChar drive;
		TInt err = ipDataOwnerManager->GetRFs().DriveToChar(aDriveNumber, drive);
		LEAVEIFERROR(err, OstTrace1(TRACE_ERROR, DUP8_CDATAOWNER_GETNEXTPUBLICFILEL, "Leave: %d", err));
		
		if (aReset) 
			{
			// Reset and start at the beginning
			iPublicFileIndex = -1;
			
			// Go through and close all RDirs, then reset the array.
			for (stackCount = iPublicDirStack.Count(); stackCount > 0; --stackCount)
				{
				iPublicDirStack[stackCount-1].Close();
				delete iPublicDirNameStack[stackCount-1];
				}
			iPublicDirStack.Reset();
			iPublicDirNameStack.Reset();

			// Build the list of excludes			
			iPublicExcludes.Reset();
			TInt selectionCount = iPublicSelections.Count();
			for (TInt x = 0; x < selectionCount; ++x)
				{
	            const TDesC& selectionName = iPublicSelections[x]->SelectionName();
	            OstTraceExt3(TRACE_NORMAL, CDATAOWNER_GETNEXTPUBLICFILEL, "selection[%03d]: %S, type: %d", x, selectionName, iPublicSelections[x]->SelectionType());
				if (iPublicSelections[x]->SelectionType() == EExclude)
					{
					iPublicExcludes.AppendL(selectionName);
					} // else
				} // for x
			} // if (aReset)
			
		while (!endOfList && !gotEntry)
			{
			stackCount = iPublicDirStack.Count();
			if (stackCount == 0)
				{
				// Directory stack is empty, proceed to the next included file entry
				do { ++iPublicFileIndex; }
				while (iPublicFileIndex < iPublicSelections.Count() &&
						iPublicSelections[iPublicFileIndex]->SelectionType() != EInclude);

				if (iPublicFileIndex < iPublicSelections.Count())
					{
					const TDesC& selectionName = iPublicSelections[iPublicFileIndex]->SelectionName();
			        
					if (selectionName[0] == KBackSlash()[0])
						{
						// Add the drive
						fileName.Zero();
						fileName.Append(drive);
						fileName.Append(KColon);
						fileName.Append(selectionName);
						}
					else
						{
						// Handle the Exclamation (!) in Public data paths, if any.  
						// Exclamation mark in place of drive letter means that the path is to be checked in all available drives.
						// And any dataowner can keep their public files in any drive and it can be mentioned in backup_registration file as below.
						// <public_backup>
						// <include_directory name="!:\mydatabases\" />
						// </public_backup>				
						
						if ( selectionName[0] == KExclamationAsDrive()[0])
							{	
							// Map public data path using current drive being backed up.
							fileName.Zero();
							fileName.Append(drive);
							fileName.Append( selectionName.Mid(1) );
							}
						else
							if (static_cast<TChar>(selectionName[0]).GetUpperCase() == drive.GetUpperCase())
							{								
							fileName.Copy(selectionName);
							} // else
						
						} // else

					OstTraceExt1(TRACE_NORMAL, DUP1_CDATAOWNER_GETNEXTPUBLICFILEL, "next include entry filename is therefore: %S", fileName);
					if (fileName.Length() > 0)
						{
						
						// Check to see if fileName is just a drive(we cant get an entry)
						TBool isDrive = EFalse;
						if ((fileName.MatchF(KDrive) != KErrNotFound) ||
						    (fileName.MatchF(KDriveAndSlash) != KErrNotFound))
							{
							isDrive = ETrue;
							OstTrace0(TRACE_NORMAL, DUP2_CDATAOWNER_GETNEXTPUBLICFILEL, "filename is a drive");
							} // if
							
						TBool isEntry = EFalse;
						if (!isDrive)
							{
							TInt err = ipDataOwnerManager->GetRFs().Entry(fileName, aEntry);
							OstTrace1(TRACE_NORMAL, DUP3_CDATAOWNER_GETNEXTPUBLICFILEL, "get entry error: %d", err);
							aEntry.iName = fileName;
							switch (err)
								{
							case KErrNone:
								isEntry = ETrue;
								break;
							case KErrNotFound:
							case KErrPathNotFound:
							case KErrBadName:
								break;
							default:
							    OstTrace1(TRACE_ERROR, DUP6_CDATAOWNER_GETNEXTPUBLICFILEL, "Leave: %d", err);
								User::Leave(err);
								} // switch

							// Must have a trailing backslash on a directory
							if (aEntry.IsDir() && (fileName[fileName.Length() - 1] != '\\'))
								{
								fileName.Append(KBackSlash);
								}
							} // if
					
						if (isDrive || (isEntry && aEntry.IsDir()))
							{
						    OstTrace0(TRACE_NORMAL, DUP4_CDATAOWNER_GETNEXTPUBLICFILEL, "parsing directory...");
							RDir dir;
							dir.Open(ipDataOwnerManager->GetRFs(), fileName, KEntryAttMaskSupported);
							iPublicDirStack.AppendL(dir);
							iPublicDirNameStack.AppendL(fileName.AllocL());
							++stackCount;
							} // if
						else if (isEntry)
							{
							if (!IsExcluded(ETrue, fileName, iPublicExcludes))
								{
								gotEntry = ETrue;
								}
	                        else
	                            {
	                            OstTrace0(TRACE_NORMAL, DUP5_CDATAOWNER_GETNEXTPUBLICFILEL, "file is excluded!");
	                            }
							} // if
						} // else if
					}
				else
					{
					endOfList = ETrue;					
					}
				} // if (stackCount == 0)

			if (stackCount > 0)
				{
				// There is a directory on the stack, so iterate through it
				RDir& dir = iPublicDirStack[stackCount-1];
				TInt err = dir.Read(aEntry);

				if (err == KErrNone) 
					{
					// Succesfully read the next directory entry

					// Build full file path
					fileName.Zero();
					
					// loop through dir stack adding entries seperated by '\'.
					for (TInt x = 0; x < iPublicDirStack.Count(); ++x)
						{
						fileName.Append(*iPublicDirNameStack[x]);
						// Add a backslash if there's not already one
						if (fileName[fileName.Length()-1] != KBackSlash()[0]) 
							{
							fileName.Append(KBackSlash);
							}
						}

					// Append the currently entry name to complete the path
					fileName.Append(aEntry.iName);

					if (aEntry.IsDir())
						{
						// Must have a trailing backslash on directory paths
						fileName.Append(KBackSlash);
						
						// Open the directory and push it onto the dir stack
						RDir dir;
						TInt err = dir.Open(ipDataOwnerManager->GetRFs(), fileName, KEntryAttMaskSupported);
						LEAVEIFERROR(err, OstTrace1(TRACE_ERROR, DUP10_CDATAOWNER_GETNEXTPUBLICFILEL, "Leave: %d", err));
						iPublicDirStack.AppendL(dir);
						iPublicDirNameStack.AppendL(aEntry.iName.AllocL());
						++stackCount;
						}
					else
						{
						// Update entry with full path ready to return
						aEntry.iName = fileName;
						gotEntry = ETrue;
						}
					// if (entry.IsDir())
						
					}
				else if (err == KErrEof)
					{
					// Finished reading this directory, close it and pop it from the directory stack
					stackCount--;
					
					iPublicDirStack[stackCount].Close();
					iPublicDirStack.Remove(stackCount);
					
					delete iPublicDirNameStack[stackCount];
					iPublicDirNameStack.Remove(stackCount);
					}
				else
					{
				    OstTrace1(TRACE_ERROR, DUP7_CDATAOWNER_GETNEXTPUBLICFILEL, "Leave: %d", err);
					User::Leave(err);
					}
				} // if (stackCount > 0)
			}

		if (endOfList)
			{
			// If the end of the list has been reached, make sure that an empty TEntry is returned
			aEntry = TEntry();
			}
		OstTraceFunctionExit0( CDATAOWNER_GETNEXTPUBLICFILEL_EXIT );
		}


	TBool CDataOwner::IsExcluded(const TBool aIsPublic, const TDesC& aFileName, const RArray<TPtrC>& aExclude)
	/** Checks to see if a given file is excluded
	
	Checks to see if the given file is not in a private directory or in the exclude list.
	
	@param aFileName file to check
	@param aExclude list of excluded files
	@return ETrue if excluded otherwise EFalse
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_ISEXCLUDED_ENTRY );
		TBool ret = EFalse;
		
		// Check it is not in sys, resource, system or backwards path
		ret = (!((aFileName.MatchF(KSystem) == KErrNotFound) &&
			     (aFileName.MatchF(KResource) == KErrNotFound) &&
			     (aFileName.MatchF(KSys) == KErrNotFound) && 
			     (aFileName.MatchF(KOther) == KErrNotFound)
			    )
			  );
		
		// If this is public backup remove the private directory
		if (!ret && aIsPublic)
			{
		    ret = (!(aFileName.MatchF(KPrivateMatch) == KErrNotFound));
			}
		
		/**		 
		 * Check whether file is in the "NoBackup" folder or not, if yes exclude it from the backup
		 * @note: All files which are kept in "NoBackup" folder under the private directory will be 
		 * excluded from the backup by default.
		 */		
		if (!ret)
		    {
		    ret = (!(aFileName.MatchF(KPrivateNoBackup) == KErrNotFound));		    
		    }
		
		// See if the file is in a private directory the data owner can access
		if (!ret && (aFileName.MatchF(KPrivateMatch) != KErrNotFound))
			{
			// The path includes a private directory, make sure it is the data owners
			// private directory.
			const TInt KSecureIdLength(8); // This is currently the length of a secure id
			TBuf<KSecureIdLength> sid;
			sid.Num(iSecureId, EHex);
			TFileName match(KPrivateSidMatch());
			match.Append(KPad().Ptr(), KPad().Length() - sid.Length());
			match.Append(sid);
			match.Append(KStar);
			ret = (aFileName.MatchF(match) == KErrNotFound);
			} // if
		
		if (!ret)
			{
			// Is the file in the exclude list?
			const TInt count = aExclude.Count();
			for (TInt x = 0; !ret && x < count; x++)
				{				
			    OstTraceExt1(TRACE_NORMAL, CDATAOWNER_ISEXCLUDED, "file name: %S",aFileName);
				if (aExclude[x][0] == KBackSlash()[0])
					{
					// Compare with out drive
					TFileName compare = KQuestionMark();
					compare.Append(KColon);
					compare.Append(aExclude[x]);
					ret = (!(aFileName.MatchF(compare) == KErrNotFound));
					} // if
				else
					{
					// Normal compare
					ret = (aFileName.CompareF(aExclude[x]) == 0);
					} // else
				} // for x
			} // if
		
		OstTraceExt2(TRACE_NORMAL, DUP1_CDATAOWNER_ISEXCLUDED, "returns excluded: %d for file: %S", ret, aFileName);
		OstTraceFunctionExit0( CDATAOWNER_ISEXCLUDED_EXIT );
		return ret;
		}
		
	void CDataOwner::SupplyPassiveSnapshotDataL(TDriveNumber aDriveNumber, TDesC8& aBuffer, TBool aLastSection)
	/** Handles the supply of passive snapshot data
	
	@param aBuffer The buffer containing the snapshot data.
	@param aLastSection Is this the last section?
	*/
		{
        OstTraceFunctionEntry0( CDATAOWNER_SUPPLYPASSIVESNAPSHOTDATAL_ENTRY );
        OstTraceExt2(TRACE_NORMAL, CDATAOWNER_SUPPLYPASSIVESNAPSHOTDATAL, "aDriveNumber: %c, aLastSection: %d", aDriveNumber + 'A', aLastSection);

		TInt err = KErrNone;
		if (iBufferSnapshotReader == NULL)
			{
		    OstTrace0(TRACE_NORMAL, DUP1_CDATAOWNER_SUPPLYPASSIVESNAPSHOTDATAL, "making temporary snapshot holder..");
			iTempSnapshotHolder = CSnapshotHolder::NewL();
			iTempSnapshotHolder->iDriveNumber = aDriveNumber;
			iBufferSnapshotReader = CBufferSnapshotReader::NewL(iTempSnapshotHolder->iSnapshots);
			
			OstTrace0(TRACE_NORMAL, DUP2_CDATAOWNER_SUPPLYPASSIVESNAPSHOTDATAL, "trying to unpack snapshots from buffer...");
			TRAP(err, iBufferSnapshotReader->StartL(aBuffer, aLastSection));
			OstTrace1(TRACE_NORMAL, DUP3_CDATAOWNER_SUPPLYPASSIVESNAPSHOTDATAL, "unpack result was: %d", err);
			} // if
		else
			{
		    OstTrace0(TRACE_NORMAL, DUP4_CDATAOWNER_SUPPLYPASSIVESNAPSHOTDATAL, "continuing unpack operation...");
			TRAP(err, iBufferSnapshotReader->ContinueL(aBuffer, aLastSection));
			OstTrace1(TRACE_NORMAL, DUP5_CDATAOWNER_SUPPLYPASSIVESNAPSHOTDATAL, "continued unpack operation result was: %d", err);
			}
			
		if ((err != KErrNone) || aLastSection)
			{
			delete iBufferSnapshotReader;
			iBufferSnapshotReader = NULL;
			
			if (err == KErrNone)
				{
			    OstTrace0(TRACE_NORMAL, DUP6_CDATAOWNER_SUPPLYPASSIVESNAPSHOTDATAL, "Snapshots identified ok!");
				
				iSnapshots.AppendL(iTempSnapshotHolder);
				iTempSnapshotHolder = NULL;
				} // if
			else
				{
			    OstTrace1(TRACE_ERROR, DUP7_CDATAOWNER_SUPPLYPASSIVESNAPSHOTDATAL, "leaving with error: %d", err);
				User::Leave(err);
				} // else
			} // if

		OstTraceFunctionExit0( CDATAOWNER_SUPPLYPASSIVESNAPSHOTDATAL_EXIT );
		}
	
	void CDataOwner::SupplyPassiveBaseDataL(const TDriveNumber aDriveNumber, TDesC8& aBuffer, TBool aLastSection)
	/** Handles the supply of passive base data
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_SUPPLYPASSIVEBASEDATAL_ENTRY );
		OstTraceExt3(TRACE_NORMAL, CDATAOWNER_SUPPLYPASSIVEBASEDATAL, "drive: %c, aLastSection: %d, iBufferFileReader: 0x%08x", static_cast<TInt8>(aDriveNumber + 'A'), static_cast<TUint32>(aLastSection), reinterpret_cast<TInt32>(iBufferFileReader));

        TInt err = KErrNone;
		if (iBufferFileReader == NULL)
			{
			iBufferFileReader = CBufferFileReader::NewL(ipDataOwnerManager->GetRFs(), FindSnapshot(aDriveNumber), this);
			
			TRAP(err, iBufferFileReader->StartL(aBuffer, aLastSection));
			} // if
		else
			{
			TRAP(err, iBufferFileReader->ContinueL(aBuffer, aLastSection));
			} // else
			
		if ((err != KErrNone) || aLastSection)
			{
            if  ( err != KErrNone )
                {
                OstTrace1(TRACE_NORMAL, DUP1_CDATAOWNER_SUPPLYPASSIVEBASEDATAL, "error: %d", err);
                }
	
            delete iBufferFileReader;
			iBufferFileReader = NULL;
			
			LEAVEIFERROR(err, OstTrace1(TRACE_ERROR, DUP2_CDATAOWNER_SUPPLYPASSIVEBASEDATAL, "Leave: %d", err));
			} // if

		OstTraceFunctionExit0( CDATAOWNER_SUPPLYPASSIVEBASEDATAL_EXIT );
		}
		
	void CDataOwner::RequestPassiveSnapshotDataL(TDriveNumber aDriveNumber, TPtr8& aBuffer, 
												 TBool& aLastSection)
	/** Handles the request for passive snapshot data
	
	@param aDriveNumber The drive snapshot data is required.
	@param aBuffer The buffer to write the data too.
	@param aLastSection On return set to true if finished.
	*/													 
		{
        OstTraceFunctionEntry0( CDATAOWNER_REQUESTPASSIVESNAPSHOTDATAL_ENTRY );
        OstTraceExt3(TRACE_NORMAL, CDATAOWNER_REQUESTPASSIVESNAPSHOTDATAL, "aDriveNumber: %c, owner: 0x%08x, bufferLen: %d", static_cast<TInt8>(aDriveNumber + 'A'), iSecureId.iId, static_cast<TInt32>(aBuffer.Length()));

		if (iBufferSnapshotWriter == NULL)
			{
			RFileArray fileinfos;
			CleanupClosePushL(fileinfos);
			
			CDesCArray* filenames = new(ELeave) CDesCArrayFlat(KDesCArrayGranularity);
			CleanupStack::PushL(filenames);

			BuildFileListL(iPassiveSelections, aDriveNumber, EPassiveBaseData, EFalse, NULL, &fileinfos, filenames);
			
			// Add the DBMS file
			AddDBMSFilesL(aDriveNumber, filenames, &fileinfos);
			
			const TInt count = fileinfos.Count();
			if (count > 0)
				{
			    OstTrace1(TRACE_NORMAL, DUP1_CDATAOWNER_REQUESTPASSIVESNAPSHOTDATAL, "got %d entries...", count);

				// Create a tempory snapshot holder
				RSnapshots* tempSnapshots = new(ELeave) RSnapshots();
				TCleanupItem cleanup(CleanupRPointerArray, tempSnapshots);
				CleanupStack::PushL(cleanup);
				
				for (TInt x = 0; x < count; x++)
					{
					const TDesC& fileName = (*filenames)[x];
					CSnapshot* snapshot = CSnapshot::NewLC(fileinfos[x].iModified.Int64(), fileName);
					OstTraceExt3(TRACE_NORMAL, DUP2_CDATAOWNER_REQUESTPASSIVESNAPSHOTDATAL, "snapshot[%2d/%2d] = %S", x+1, count, fileName);
					tempSnapshots->AppendL(snapshot);
					CleanupStack::Pop(snapshot);
					} // for x
				
				// Create a buffer writer
				iBufferSnapshotWriter = CBufferSnapshotWriter::NewL(tempSnapshots);
				CleanupStack::Pop(tempSnapshots);
				
				OstTrace0(TRACE_NORMAL, DUP3_CDATAOWNER_REQUESTPASSIVESNAPSHOTDATAL, "writing snapshots to buffer...");
				iBufferSnapshotWriter->StartL(aBuffer, aLastSection);
				if (aLastSection)
					{
					delete iBufferSnapshotWriter;
					iBufferSnapshotWriter = NULL;
					} // if
					
				
				} // if
			else
				{
				aLastSection = ETrue;
				} // else
			
			CleanupStack::PopAndDestroy(filenames);
			CleanupStack::PopAndDestroy(&fileinfos);
			} // if
		else
			{
			iBufferSnapshotWriter->ContinueL(aBuffer, aLastSection);
			if (aLastSection)
				{
				delete iBufferSnapshotWriter;
				iBufferSnapshotWriter = NULL;
				} // if
			} // else

		OstTraceExt2(TRACE_NORMAL, DUP4_CDATAOWNER_REQUESTPASSIVESNAPSHOTDATAL, "aLastSection: %d, bufferLen: %d", aLastSection, aBuffer.Length());
		OstTraceFunctionExit0( CDATAOWNER_REQUESTPASSIVESNAPSHOTDATAL_EXIT );
		} // RequestPassiveSnapShotDataL
		
	void CDataOwner::RequestPassiveDataL(TTransferDataType aTransferType, 
										 TDriveNumber aDriveNumber, TPtr8& aBuffer, 
									     TBool& aLastSection)
	/** Handles the request for passive base data
	
	@param aDriveNumber The drive that files must be on.
	@param aBuffer The buffer to write the data to.
	@param aLastSection On return set to true if finished.
	*/
		{
        OstTraceFunctionEntry0( CDATAOWNER_REQUESTPASSIVEDATAL_ENTRY );
        OstTraceExt4(TRACE_NORMAL, CDATAOWNER_REQUESTPASSIVEDATAL, "aDrive: %c, aTransferType: %d, iSecureId: 0x%08x, iBufferFileWriter: 0x%08x", static_cast<TInt8>(aDriveNumber + 'A'), static_cast<TInt32>(aTransferType), iSecureId.iId, reinterpret_cast<TInt32>(iBufferFileWriter));

        // Build the list of files
		if (iBufferFileWriter == NULL)
			{
			CDesCArray* filenames = new(ELeave) CDesCArrayFlat(KDesCArrayGranularity);
			CleanupStack::PushL(filenames);

			if (aTransferType == EPassiveBaseData)
				{
			    OstTrace0(TRACE_NORMAL, DUP1_CDATAOWNER_REQUESTPASSIVEDATAL, "EPassiveBaseData...");
				BuildFileListL(iPassiveSelections, aDriveNumber, aTransferType, EFalse, NULL, NULL, filenames);
				
				// Add the DBMS file
				AddDBMSFilesL(aDriveNumber, filenames, NULL);
				} // if
			else
				{
				// Do we have a snapshot?
				const TInt count = iSnapshots.Count();
				RSnapshots* pSnapshot = NULL;
				for (TInt x = 0; !pSnapshot && (x < count); x++)
					{
					if (iSnapshots[x]->iDriveNumber == aDriveNumber)
						{
						pSnapshot = &(iSnapshots[x]->iSnapshots);
						} // if
					} // for x
					
				BuildFileListL(iPassiveSelections, aDriveNumber, aTransferType, EFalse, pSnapshot, NULL, filenames);
				
				// Do we need to add the DBMS file?
				AddDBMSFilesL(aDriveNumber, filenames, NULL);
				} // else


			OstTrace1(TRACE_NORMAL, DUP2_CDATAOWNER_REQUESTPASSIVEDATAL, "Got %d files...", filenames->Count());
			if (filenames->Count() > 0)
				{
				// Create a file writer
				iBufferFileWriter = CBufferFileWriter::NewL(ipDataOwnerManager->GetRFs(), filenames);
				CleanupStack::Pop(filenames);
				
				iBufferFileWriter->StartL(aBuffer, aLastSection);
				if (aLastSection)
					{
					delete iBufferFileWriter;
					iBufferFileWriter = NULL;
					}
				} // if
			else
				{
				CleanupStack::PopAndDestroy(filenames);
				aLastSection = ETrue;
				} // else

			} // if
		else
			{
			iBufferFileWriter->ContinueL(aBuffer, aLastSection);
			if (aLastSection)
				{
				delete iBufferFileWriter;
				iBufferFileWriter = NULL;
				} // if
			} // else
		
		OstTraceFunctionExit0( CDATAOWNER_REQUESTPASSIVEDATAL_EXIT );
		}
		
	void CDataOwner::IsNewerL(const TDesC& aFileName, const TEntry& aFile, const RSnapshots* aSnapshots, TBool& aNewer)
	/** Check to see if a file is newer.
	
	Checks to see if aFile is newer than the one contained in aFiles.
	
	@param aFile the file to check.
	@param aFiles the array of files to check agaisnt
	@param aNewer on return ETrue if aFile is newer, EFalse otherwise.
	@leave KErrNotFound if aFile does not exist in aFiles.
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_ISNEWERL_ENTRY );
		CSnapshot* snapshot = CSnapshot::NewLC(TTime().Int64(), aFileName);
		TInt res = aSnapshots->Find(snapshot, CSnapshot::Match);
		CleanupStack::PopAndDestroy(snapshot);
		LEAVEIFERROR(res, OstTrace1(TRACE_ERROR, CDATAOWNER_ISNEWERL, "Leave: %d", res));
		if (aFile.iModified.Int64() > (*aSnapshots)[res]->Modified())
			{
			aNewer = ETrue;
			}
		else
			{
			aNewer = EFalse;
			}
		OstTraceFunctionExit0( CDATAOWNER_ISNEWERL_EXIT );
		}
	
	RSnapshots* CDataOwner::FindSnapshot(TDriveNumber aDriveNumber)
	/** Searches the snapshots find a snapshot
	
	@param aDriveNumber find snapshot for drive aDriveNumber
	@return The snapshot or NULL
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_FINDSNAPSHOT_ENTRY );
		const TInt count = iSnapshots.Count();
		OstTraceExt3(TRACE_NORMAL, CDATAOWNER_FINDSNAPSHOT, "aDriveNumber: %c, count: %d, iSecureId: 0x%08x", static_cast<TInt8>(aDriveNumber + 'A'), static_cast<TInt32>(count), iSecureId.iId);

        RSnapshots* pRet = NULL;
		
		for (TInt x = 0; !pRet && (x < count); x++)
			{
            CSnapshotHolder* snapshotHolder = iSnapshots[x];

            const TInt entryCount = snapshotHolder->iSnapshots.Count();
            OstTraceExt4(TRACE_NORMAL, DUP1_CDATAOWNER_FINDSNAPSHOT, "snapshot[%02d] - drive: %c, entry Count: %d, addr: 0x%08x", static_cast<TInt32>(x), static_cast<TInt8>(snapshotHolder->iDriveNumber + 'A'), static_cast<TInt32>(entryCount), reinterpret_cast<TUint32>(&snapshotHolder->iSnapshots));

            for(TInt i=0; i<entryCount; i++)
                {
                const TDesC& snapshot = snapshotHolder->iSnapshots[i]->FileName();
                OstTraceExt2(TRACE_NORMAL, DUP2_CDATAOWNER_FINDSNAPSHOT, "file[%04d]: %S", i+1, snapshot);
                }

			if (snapshotHolder->iDriveNumber == aDriveNumber)
				{
				pRet = &(snapshotHolder->iSnapshots);
				} // if
			} // for x
			
		OstTrace1(TRACE_NORMAL, DUP3_CDATAOWNER_FINDSNAPSHOT, "ret: 0x%08x", pRet);
		OstTraceFunctionExit0( CDATAOWNER_FINDSNAPSHOT_EXIT );
		return pRet;
		}
		
	/**
	Returns a reference to a state by drive object. Object is located using aDrive as a key
	@param aDrive Index identifying the TDataOwnerStateByDrive
	*/
	TDataOwnerStateByDrive& CDataOwner::StateByDriveL(TDriveNumber& aDrive)
		{
		OstTraceFunctionEntry0( CDATAOWNER_STATEBYDRIVEL_ENTRY );
		TBool found = EFalse;
		const TInt count = iStateByDrive.Count();
		TInt index = 0;

		// Loop around until we find		
		while ((index < count) && !found)
			{
			if (iStateByDrive[index].iDrive == aDrive)
				{
				found = ETrue;
				}
			else
				{
				++index;
				}
			}
		
		// We must have found, otherwise error	
		if (!found)
			{
		    OstTrace0(TRACE_ERROR, CDATAOWNER_STATEBYDRIVEL, "Leave: KErrNotFound");
			User::Leave(KErrNotFound);
			}
			
		OstTraceFunctionExit0( CDATAOWNER_STATEBYDRIVEL_EXIT );
		return iStateByDrive[index];
		}

	/**
	Returns a reference to a proxy state by drive object. Object is located using aDrive and aProxy as keys
	@param aDrive Index identifying the TProxyStateByDrive
	@param aProxy Index identifying the proxy
	*/
	TProxyStateByDrive& CDataOwner::ProxyStateByDriveL(TDriveNumber& aDrive, TInt aProxy)
		{
		OstTraceFunctionEntry0( CDATAOWNER_PROXYSTATEBYDRIVEL_ENTRY );
		TBool found = EFalse;
		const TInt count = iProxyStateByDrive.Count();
		TInt index = 0;

		// Loop around until we find		
		while ((index < count) && !found)
			{
			if (iProxyStateByDrive[index].iDrive == aDrive &&
				iProxyStateByDrive[index].iProxy == aProxy)
				{
				found = ETrue;
				}
			else
				{
				++index;
				}
			}
		
		// Add a new entry if not found
		if (!found)
			{
			iProxyStateByDrive.Append(TProxyStateByDrive(aDrive,aProxy));
			index = count;
			}
			
		OstTraceFunctionExit0( CDATAOWNER_PROXYSTATEBYDRIVEL_EXIT );
		return iProxyStateByDrive[index];
		}


	
	/**
	Called to re-create the state-by-drive array
	*/
	void CDataOwner::BuildDriveStateArrayL()
		{
		OstTraceFunctionEntry0( CDATAOWNER_BUILDDRIVESTATEARRAYL_ENTRY );
		TDriveList driveList;
		driveList.SetMax();
		
		TRAPD(err, GetDriveListL(driveList));
		OstTraceExt2(TRACE_NORMAL, CDATAOWNER_BUILDDRIVESTATEARRAYL, "SID: 0x%08x, error: %d", iSecureId.iId, static_cast<TInt32>(err));
		
		if (err == KErrNone)
			{
			for (TInt index = 0; index < KMaxDrives; index++)
				{
				if (driveList[index])
					{
					// Add a new state object to the array of states
					iStateByDrive.AppendL(TDataOwnerStateByDrive(static_cast<TDriveNumber>(index)));
					}
				}
			}
		else
			{
		    OstTrace1(TRACE_NORMAL, DUP1_CDATAOWNER_BUILDDRIVESTATEARRAYL, "Warning! error ocurred whilst getting the drivelist from data owner %08x", iSecureId.iId);
			}
		OstTraceFunctionExit0( CDATAOWNER_BUILDDRIVESTATEARRAYL_EXIT );
		}
		
		
	/** 
	Adds the list of DBMS files to a filename list
	*/
	void CDataOwner::AddDBMSFilesL(TDriveNumber aDriveNumber, CDesCArray* apFileNames, RFileArray* apEntries)
		{
		OstTraceFunctionEntry0( CDATAOWNER_ADDDBMSFILESL_ENTRY );
		const TInt count = iDBMSSelections.Count();
		OstTraceExt3(TRACE_NORMAL, CDATAOWNER_ADDDBMSFILESL, "aDriveNumber: %c, owner: 0x%08x, count: %d", static_cast<TInt8>(aDriveNumber + 'A'), iSecureId.iId, static_cast<TInt32>(count));

        if (count > 0)
			{
			// Get DB connection
			RDbs dbs;
			TInt err = dbs.Connect();
			LEAVEIFERROR(err, OstTrace1(TRACE_ERROR, DUP10_CDATAOWNER_ADDDBMSFILESL, "Leave: %d", err));
			CleanupClosePushL(dbs);
			
			for (TInt x = 0; x < count; x++)
				{
				// Get list of filenames
				TInt err = KErrNone; 
				CDbStrings* pFilenames = NULL;
				TRAP(err, pFilenames = dbs.BackupPathsL(iSecureId, iDBMSSelections[x]));
					
				if (err == KErrNone)
					{
					CleanupStack::PushL(pFilenames);
					
					OstTrace1(TRACE_NORMAL, DUP1_CDATAOWNER_ADDDBMSFILESL, "getting backup paths for owner returned error: %d", err);
		        	
					const TInt count = pFilenames->Count();
					for (TInt x = 0; x < count; x++)
						{
                        const TDesC& pFileName = (*pFilenames)[x];
                        OstTraceExt3(TRACE_NORMAL, DUP2_CDATAOWNER_ADDDBMSFILESL, "file[%3d/%3d] = %S", x + 1, count, pFileName);

						TInt drive = -1;
						TInt driveerr = RFs::CharToDrive( pFileName[0], drive);
						if ((driveerr == KErrNone) && (drive == aDriveNumber))
							{ 
							if (apFileNames)
								{
							    OstTraceExt1(TRACE_NORMAL, DUP3_CDATAOWNER_ADDDBMSFILESL, "adding validated filename: %S", pFileName);
								apFileNames->AppendL( pFileName );
								}
							if (apEntries)
								{
								TEntry entry;
								TInt entryError = ipDataOwnerManager->GetRFs().Entry( pFileName, entry);
								OstTraceExt2(TRACE_NORMAL, DUP4_CDATAOWNER_ADDDBMSFILESL, "drive entry result for file \'%S\' is: %d", pFileName, entryError);
								if (entryError == KErrNone)
									{
								    OstTraceExt1(TRACE_NORMAL, DUP5_CDATAOWNER_ADDDBMSFILESL, "adding validated entry: %S", pFileName);
									apEntries->AppendL(entry);
									} // if
								else if (entryError != KErrNotFound)
									{
								    OstTraceExt2(TRACE_NORMAL, DUP6_CDATAOWNER_ADDDBMSFILESL, "Could not get entry for 0x%08x, error: %d", iSecureId.iId, static_cast<TInt32>(entryError));
									} // else if
								} // if
							} // if
						else
    						{
						    OstTrace0(TRACE_NORMAL, DUP7_CDATAOWNER_ADDDBMSFILESL, "File is not applicable for this drive => file ignored");
    						}
						} // for x
					
					// Cleanup	
					CleanupStack::PopAndDestroy(pFilenames);
					}
				else
					{
				    OstTraceExt2(TRACE_NORMAL, DUP8_CDATAOWNER_ADDDBMSFILESL, "RDbs error %d SID: 0x%08x", static_cast<TInt32>(err), iSecureId.iId);
					} // else
				} // for x
			
			// Cleanup
			CleanupStack::PopAndDestroy(&dbs);	
			} // if
		
        OstTraceExt2(TRACE_NORMAL, DUP9_CDATAOWNER_ADDDBMSFILESL, "aDriveNumber: %c, owner: 0x%08x", static_cast<TInt8>(aDriveNumber + 'A'), iSecureId.iId);
		OstTraceFunctionExit0( CDATAOWNER_ADDDBMSFILESL_EXIT );
		} // AddDBMSFiles
		
	/** Disables system data
	*/
	void CDataOwner::DisableSystemData()
		{
		iSystemInformation.iSupported = EFalse;
		} // Disable system data
		
	TInt CDataOwner::AddProxyToList(TProxyInformation aProxy)
	/** Adds proxy to list making sure there are no duplicates
	@param TProxyInformation Proxy to add 
	@return error if Append failes
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_ADDPROXYTOLIST_ENTRY );
		TInt count = iProxyInformationArray.Count();
		TBool found = EFalse;
		
		while (count && !found)
			{
			--count;
			if (iProxyInformationArray[count].iSecureId == aProxy.iSecureId)
				{
				found = ETrue;
				}
			}
			
		TInt err = KErrNone;		
		if (!found)
			{
			err = iProxyInformationArray.Append(aProxy);
			OstTraceExt2(TRACE_NORMAL, CDATAOWNER_ADDPROXYTOLIST, "Data owner(0x%08x): Adding Proxy(0x%08x) to the list", iSecureId.iId,aProxy.iSecureId.iId);
			}
		OstTraceFunctionExit0( CDATAOWNER_ADDPROXYTOLIST_EXIT );
		return err;
		}	
		
	void CDataOwner::CleanupBeforeRestoreL(TDriveNumber& aDriveNumber)
	/** Performs a cleanup before restore if required
	@param aDriveNumber drive to clear
	*/
		{
        OstTraceFunctionEntry0( CDATAOWNER_CLEANUPBEFORERESTOREL_ENTRY );
        const TBool passiveDeleteBeforeRestore = iPassiveInformation.iDeleteBeforeRestore;
        const TBool driveAlreadyCleaned = StateByDriveL(aDriveNumber).iDeleteBeforeRestorePerformed;

        OstTraceExt4(TRACE_NORMAL, CDATAOWNER_CLEANUPBEFORERESTOREL, "aDriveNumber: %c, owner: 0x%08x, passiveDeleteBeforeRestore: %d, driveAlreadyCleaned: %d", static_cast<TInt8>(aDriveNumber + 'A'), static_cast<TInt32>(iSecureId.iId), static_cast<TInt32>(passiveDeleteBeforeRestore), static_cast<TInt32>(driveAlreadyCleaned));

        if  ( passiveDeleteBeforeRestore && !driveAlreadyCleaned )
			{
			RSelections* selections = new(ELeave) RSelections();
			TCleanupItem cleanup(CleanupRPointerArray, selections);
			CleanupStack::PushL(cleanup);
			// The path to search for files to delete
			
			CSelection* selection = NULL;
			const TDesC& privatePath = *iPrivatePath;
			if (privatePath[0] == KBackSlash()[0])
				{
				selection = CSelection::NewLC(EInclude, privatePath);
				} // if
			else
				{
				selection = CSelection::NewLC(EInclude, privatePath.Right(privatePath.Length() - 2));
				} // else
			selections->AppendL(selection);
			CleanupStack::Pop(selection);
			
			// Find the files to delete
			CDesCArray* toDelete = new(ELeave) CDesCArrayFlat(KDesCArrayGranularity);
			CleanupStack::PushL(toDelete);
			
			BuildFileListL(*selections, aDriveNumber, EPassiveBaseData, EFalse, NULL, NULL, toDelete);
			
			// Loop through the files to delete, deleting them
			const TInt count = toDelete->Count();
			for (TInt x = 0; x < count; x++)
				{
				const TDesC& fileName = (*toDelete)[x];

				OstTraceExt3(TRACE_NORMAL, DUP1_CDATAOWNER_CLEANUPBEFORERESTOREL, "checking file[%2d/%2d] for match = %S", x + 1, count, fileName);

                // Check it is not a backup registration file
				if  ( fileName.MatchF(KBackupRegistrationFile) == KErrNotFound )
					{
					TInt deleteError=0;
                    if((fileName[(fileName.Length())-1])== KBackSlash()[0])
						{
						  deleteError = ipDataOwnerManager->GetRFs().RmDir( fileName );
						}
					else
						{
						  deleteError = ipDataOwnerManager->GetRFs().Delete( fileName );
						}
                    OstTraceExt2(TRACE_NORMAL, DUP2_CDATAOWNER_CLEANUPBEFORERESTOREL, "trying to deleting file %S (error was: %d)", fileName, deleteError);
					LEAVEIFERROR(deleteError, OstTrace1(TRACE_ERROR, DUP4_CDATAOWNER_CLEANUPBEFORERESTOREL, "Leave: %d", deleteError));
					} // if
				} // for
			
			// Mark as done
			StateByDriveL(aDriveNumber).iDeleteBeforeRestorePerformed = ETrue;
			
			// Cleanup
			CleanupStack::PopAndDestroy(toDelete);
			CleanupStack::PopAndDestroy(selections);
			} // if

        OstTraceExt2(TRACE_NORMAL, DUP3_CDATAOWNER_CLEANUPBEFORERESTOREL, "aDriveNumber: %c, owner: 0x%08x", static_cast<TInt8>(aDriveNumber + 'A'), iSecureId.iId);
		OstTraceFunctionExit0( CDATAOWNER_CLEANUPBEFORERESTOREL_EXIT );
		} 
	/**
	Check if the file is in the include list
	
	@param TDesC& aFileName file name to check
	@return TBool ETrue if file is in the include list
	*/
	TBool CDataOwner::ValidFileL(const TDesC& aFileName)
		{
        OstTraceFunctionEntry0( CDATAOWNER_VALIDFILEL_ENTRY );
        OstTraceExt2(TRACE_NORMAL, CDATAOWNER_VALIDFILEL, "owner: 0x%08x, aFileName: %S", iSecureId.iId, aFileName);

        TInt include = EFalse;
		
        const TInt count = iPassiveSelections.Count();
		for (TInt i =0; i < count; i++)
			{
			const TDesC& selectionName = iPassiveSelections[i]->SelectionName();
			TInt match = aFileName.FindF(selectionName);
			OstTraceExt5(TRACE_NORMAL, DUP1_CDATAOWNER_VALIDFILEL, "match result against file[%3d/%3d], selectionType: %d, matchResult: %d, name: %S", i+1, count, iPassiveSelections[i]->SelectionType(), match, selectionName);
            
            if (match >= 0)
				{
				if (iPassiveSelections[i]->SelectionType() == EInclude)
					{
				    OstTrace0(TRACE_NORMAL, DUP2_CDATAOWNER_VALIDFILEL, "file included");
					include = ETrue;
					}
				else
					{
				    OstTrace0(TRACE_NORMAL, DUP3_CDATAOWNER_VALIDFILEL, "file excluded");
					include = EFalse;
					break;	
					} // else if
				} //if 
			
			} // for
			

        const TInt dbmsSelectionCount = iDBMSSelections.Count();
		if (dbmsSelectionCount && !include)
			{
		    OstTrace1(TRACE_NORMAL, DUP4_CDATAOWNER_VALIDFILEL, "checking against %d DBMS files...", dbmsSelectionCount);

            for (TInt j = 0; j < dbmsSelectionCount; j++)
				{
                const TDesC& pDbmsFileName =  iDBMSSelections[j].Name();
                const TInt matchResult = aFileName.FindF( pDbmsFileName );

                OstTraceExt4(TRACE_NORMAL, DUP5_CDATAOWNER_VALIDFILEL, "checking against DBMS file[%2d/%2d] with result: %d (%S)...", j+1, dbmsSelectionCount, matchResult, pDbmsFileName);

                if  ( matchResult )
					{
                    OstTrace0(TRACE_NORMAL, DUP6_CDATAOWNER_VALIDFILEL, "DBMS file included");
					include = ETrue;
					break;
					} // if
				}//for
			} // if
		
		OstTrace1(TRACE_NORMAL, DUP7_CDATAOWNER_VALIDFILEL, "valid file result is: %d", include);
		OstTraceFunctionExit0( CDATAOWNER_VALIDFILEL_EXIT );
		return include;
		}
		
	//	
	//  MContentHandler Implementaion //
	//
	


	void CDataOwner::OnStartDocumentL(const RDocumentParameters& /*aDocParam*/, TInt aErrorCode)
	/** MContentHandler::OnStartDocumentL()
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_ONSTARTDOCUMENTL_ENTRY );
		if (aErrorCode != KErrNone)
			{
		    OstTrace1(TRACE_ERROR, CDATAOWNER_ONSTARTDOCUMENTL, "error = %d", aErrorCode);
			User::Leave(aErrorCode);
			}
		OstTraceFunctionExit0( CDATAOWNER_ONSTARTDOCUMENTL_EXIT );
		}
		
	void CDataOwner::OnEndDocumentL(TInt aErrorCode)
	/** MContentHandler::OnEndDocumentL()
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_ONENDDOCUMENTL_ENTRY );
		if (aErrorCode != KErrNone)
			{
			// just to satifsy UREL compiler
			(void) aErrorCode;
			OstTrace1(TRACE_NORMAL, CDATAOWNER_ONENDDOCUMENTL, "error = %d", aErrorCode);
			}
		OstTraceFunctionExit0( CDATAOWNER_ONENDDOCUMENTL_EXIT );
		}
		
	void CDataOwner::OnStartElementL(const RTagInfo& aElement, 
									  const RAttributeArray& aAttributes, 
									  TInt aErrorCode)
	/** MContentHandler::OnStartElementL()

	@leave KErrUnknown an unknown element
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_ONSTARTELEMENTL_ENTRY );
		if (aErrorCode != KErrNone)
			{
		    OstTrace1(TRACE_NORMAL, CDATAOWNER_ONSTARTELEMENTL, "error = %d", aErrorCode);
			LEAVEIFERROR(aErrorCode, OstTrace1(TRACE_ERROR, DUP2_CDATAOWNER_ONSTARTELEMENTL, "Leave: %d", aErrorCode));
			}
		
		TInt err;
		TBool unknownElement = EFalse;
		const TDesC8& localName = aElement.LocalName().DesC();
		if (localName == KIncludeFile) 
			{
			HandlePathL(EInclude, aAttributes, EFalse);
			}
		else if (!localName.CompareF(KIncludeDirectory))
			{
			HandlePathL(EInclude, aAttributes, ETrue);
			}
		else if (!localName.CompareF(KExclude))
			{
			HandlePathL(EExclude, aAttributes, EFalse);
			}
		else if (!localName.CompareF(KBackupRegistration))
			{
			HandleBackupRegistrationL(aAttributes);
			}
		else if (!localName.CompareF(KDBMSBackup))
			{
		    err = HandleDBMSBackupL(aAttributes);
			LEAVEIFERROR(err, OstTrace1(TRACE_ERROR, DUP3_CDATAOWNER_ONSTARTELEMENTL, "Leave: %d", err));
			}
		else if (!localName.CompareF(KSystemBackup))
			{
		    err = HandleSystemBackup(aAttributes);
			LEAVEIFERROR(err, OstTrace1(TRACE_ERROR, DUP4_CDATAOWNER_ONSTARTELEMENTL, "Leave: %d", err));
			}
		else if (!localName.CompareF(KProxyDataManager))
			{
		    err = HandleProxyDataManager(aAttributes);
			LEAVEIFERROR(err, OstTrace1(TRACE_ERROR, DUP5_CDATAOWNER_ONSTARTELEMENTL, "Leave: %d", err));
			}
		else if (!localName.CompareF(KCenrepBackup))
			{
		    err = HandleCenrepBackup(aAttributes);
			LEAVEIFERROR(err, OstTrace1(TRACE_ERROR, DUP6_CDATAOWNER_ONSTARTELEMENTL, "Leave: %d", err));
			}
		else if (!localName.CompareF(KPublicBackup))
			{
			iCurrentElement = EPublic;
			err = HandlePublicBackup(aAttributes);
			LEAVEIFERROR(err, OstTrace1(TRACE_ERROR, DUP7_CDATAOWNER_ONSTARTELEMENTL, "Leave: %d", err));
			}
		else if (!localName.CompareF(KPassiveBackup))
			{
			iCurrentElement = EPassive;
			// Only allow passive to be switched on in primary files
			if (iPrimaryFile)
				{
			    err = HandlePassiveBackup(aAttributes);
				LEAVEIFERROR(err, OstTrace1(TRACE_ERROR, DUP8_CDATAOWNER_ONSTARTELEMENTL, "Leave: %d", err));
				}
			}
		else if (iPrimaryFile) 
			{
			// These remaining elements are only allowed in primary files
			if (!localName.CompareF(KActiveBackup))
				{
			    err = HandleActiveBackupL(aAttributes);
				LEAVEIFERROR(err, OstTrace1(TRACE_ERROR, DUP9_CDATAOWNER_ONSTARTELEMENTL, "Leave: %d", err));
				}
			else if (!localName.CompareF(KRestore))
				{
			    err = HandleRestore(aAttributes);
				LEAVEIFERROR(err, OstTrace1(TRACE_ERROR, DUP10_CDATAOWNER_ONSTARTELEMENTL, "Leave: %d", err));
				}
			else 
				{
				unknownElement = ETrue;
				}
			} // if primary file true
		else
			{
			unknownElement = ETrue;
			}
			
		if (unknownElement)
			{
		    OstTrace1(TRACE_NORMAL, DUP1_CDATAOWNER_ONSTARTELEMENTL, "Unknown element while parsing 0x%08x", iSecureId.iId);
			}
		OstTraceFunctionExit0( CDATAOWNER_ONSTARTELEMENTL_EXIT );
		}

	
	void CDataOwner::OnEndElementL(const RTagInfo& aElement, TInt aErrorCode)
	/** MContentHandler::OnEndElementL()
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_ONENDELEMENTL_ENTRY );
		if (aErrorCode != KErrNone)
			{
		    OstTrace1(TRACE_ERROR, CDATAOWNER_ONENDELEMENTL, "error = %d", aErrorCode);
			User::Leave(aErrorCode);
			}
		
		const TDesC8& localName = aElement.LocalName().DesC();
		if (!localName.CompareF(KPassiveBackup))
			{
			iCurrentElement = ENoElement;
			} // if
		else if (localName == KPublicBackup)
			{
			iCurrentElement = ENoElement;
			} // else if
		OstTraceFunctionExit0( CDATAOWNER_ONENDELEMENTL_EXIT );
		}

	void CDataOwner::OnContentL(const TDesC8& /*aBytes*/, TInt /*aErrorCode*/)
	/** MContentHandler::OnContentL()
	*/
		{
		// Not handled
		}

	void CDataOwner::OnStartPrefixMappingL(const RString& /*aPrefix*/, 
											const RString& /*aUri*/, TInt /*aErrorCode*/)
	/** MContentHandler::OnStartPrefixMappingL()
	*/
		{
		// Not handled
		}

	void CDataOwner::OnEndPrefixMappingL(const RString& /*aPrefix*/, TInt /*aErrorCode*/)
	/** MContentHandler::OnEndPrefixMappingL()
	*/
		{
		// Not handled
		}

	void CDataOwner::OnIgnorableWhiteSpaceL(const TDesC8& /*aBytes*/, TInt /*aErrorCode*/)
	/** MContentHandler::OnIgnorableWhiteSpaceL()
	*/
		{
		// Not handled
		}

	void CDataOwner::OnSkippedEntityL(const RString& /*aName*/, TInt /*aErrorCode*/)
	/** MContentHandler::OnSkippedEntityL()
	*/
		{
		// Not handled
		}

	void CDataOwner::OnProcessingInstructionL(const TDesC8& /*aTarget*/, 
											   const TDesC8& /*aData*/, 
											   TInt /*aErrorCode*/)
	/** MContentHandler::OnProcessingInstructionL()
	*/
		{
		// Not handled
		}

	void CDataOwner::OnError(TInt aErrorCode)
	/** MContentHandler::OnError()

	@leave aErrorCode
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_ONERROR_ENTRY );
		(void)aErrorCode;
		OstTrace1(TRACE_NORMAL, CDATAOWNER_ONERROR, "error = %d", aErrorCode);
		OstTraceFunctionExit0( CDATAOWNER_ONERROR_EXIT );
		}

	TAny* CDataOwner::GetExtendedInterface(const TInt32 /*aUid*/)
	/** MContentHandler::OnEndPrefixMappingL()
	*/
		{
		return NULL;
		}

	void CDataOwner::HandleBackupRegistrationL(const RAttributeArray& aAttributes)
	/** Handles the "backup_registration" element

	@param aAttributes the attributes for the element
	@return KErrNone no errors
	@return KErrUnknown unknown version
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_HANDLEBACKUPREGISTRATIONL_ENTRY );
		if (aAttributes.Count() == 1)
			{
			// Check the version is correct.
			if (aAttributes[0].Value().DesC() != KVersion()) // Only version we know about
				{
			    OstTrace1(TRACE_ERROR, CDATAOWNER_HANDLEBACKUPREGISTRATIONL, "Unknown version at SID(0x%08x)", iSecureId.iId);
				User::Leave(KErrNotSupported);
				} // else
			} // if
		OstTraceFunctionExit0( CDATAOWNER_HANDLEBACKUPREGISTRATIONL_EXIT );
		}


	TInt CDataOwner::HandlePassiveBackup(const RAttributeArray& aAttributes)
	/** Handles the "passive_backup" element

	@param aAttributes the attributes for the element
	@return KErrNone
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_HANDLEPASSIVEBACKUP_ENTRY );
		iPassiveInformation.iSupported = ETrue;
		
		// Loop through reading out attribute values
		const TInt count = aAttributes.Count();
		for (TInt x = 0; x < count; x++)
			{
			const TDesC8& localName = aAttributes[x].Attribute().LocalName().DesC();

            if  ( localName.CompareF(KSupportsSelective) == 0 )
				{
                const TBool supportsSelective = ( aAttributes[x].Value().DesC().CompareF(KYes) == 0 );
				iPassiveInformation.iSupportsSelective = supportsSelective;
				OstTraceExt2(TRACE_NORMAL, DUP3_CDATAOWNER_HANDLEPASSIVEBACKUP, "(0x%08x) - iPassiveInformation.iSupportsSelective: %d", iSecureId.iId, static_cast<TInt32>(supportsSelective));
                } // if
			else if ( localName.CompareF(KDeleteBeforeRestore) == 0 )
				{
				// AW This logic looks somewhat strange.
				if (!aAttributes[x].Value().DesC().CompareF(KYes))
					{
				    OstTrace1(TRACE_NORMAL, DUP1_CDATAOWNER_HANDLEPASSIVEBACKUP, "(0x%08x) - iPassiveInformation.iDeleteBeforeRestore: ETrue", iSecureId.iId);
					iPassiveInformation.iDeleteBeforeRestore |= ETrue;
					} // if
				else
					{
				    OstTrace1(TRACE_NORMAL, DUP2_CDATAOWNER_HANDLEPASSIVEBACKUP, "(0x%08x) - iPassiveInformation.iDeleteBeforeRestore: EFalse", iSecureId.iId);
					iPassiveInformation.iDeleteBeforeRestore |= EFalse;
					} // else
				} // else if
			else if ( localName.CompareF(KBaseBackupOnly) == 0 )
				{
                const TBool baseBackupOnly = ( aAttributes[x].Value().DesC().CompareF(KYes) == 0 );
				iPassiveInformation.iBaseBackupOnly = baseBackupOnly;
				OstTraceExt2(TRACE_NORMAL, DUP4_CDATAOWNER_HANDLEPASSIVEBACKUP, "(0x%08x) - iPassiveInformation.iBaseBackupOnly: %d", iSecureId.iId, static_cast<TInt32>(baseBackupOnly));
				} // else if
			else
				{
			    OstTrace1(TRACE_NORMAL, DUP5_CDATAOWNER_HANDLEPASSIVEBACKUP, "Unknown element while parsing 0x%08x", iSecureId.iId);
				} // else
			} // for x
		
		OstTraceFunctionExit0( CDATAOWNER_HANDLEPASSIVEBACKUP_EXIT );
		return KErrNone;
		}


	TInt CDataOwner::HandlePublicBackup(const RAttributeArray& aAttributes)
	/** Handles the "public_backup" element

	@param aAttributes the attributes for the element
	@return KErrNone
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_HANDLEPUBLICBACKUP_ENTRY );
		iPublicInformation.iSupported = ETrue;
		
		if (aAttributes.Count() > 0)
			{
            const TBool deleteBeforeRestore = ( aAttributes[0].Value().DesC().CompareF(KYes) == 0 );
			iPublicInformation.iDeleteBeforeRestore = deleteBeforeRestore;
			OstTraceExt2(TRACE_NORMAL, CDATAOWNER_HANDLEPUBLICBACKUP, "(0x%08x) - iPublicInformation.iDeleteBeforeRestore: %d", iSecureId.iId, static_cast<TInt32>(deleteBeforeRestore));
			} // if
		
		OstTraceFunctionExit0( CDATAOWNER_HANDLEPUBLICBACKUP_EXIT );
		return KErrNone;
		}

	TInt CDataOwner::HandleSystemBackup(const RAttributeArray& /*aAttributes*/)
	/** Handles the "system_backup" element

	@param aAttributes the attributes for the element
	@return KErrNone
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_HANDLESYSTEMBACKUP_ENTRY );
		iSystemInformation.iSupported = ETrue;
		OstTraceExt2(TRACE_NORMAL, CDATAOWNER_HANDLESYSTEMBACKUP, "(0x%08x) - iSystemInformation.iSupported: %d", iSecureId.iId, static_cast<TInt32>(iSystemInformation.iSupported));

		OstTraceFunctionExit0( CDATAOWNER_HANDLESYSTEMBACKUP_EXIT );
		return KErrNone;	
		}


	TInt CDataOwner::HandleCenrepBackup(const RAttributeArray& /*aAttributes*/)
	/** Handles the "cenrep_backup" element

	@param aAttributes the attributes for the element
	@return KErrNone
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_HANDLECENREPBACKUP_ENTRY );
		TInt err = KErrNone;
		TProxyInformation proxyInformation;
		
		proxyInformation.iSecureId = ipDataOwnerManager->Config().CentRepId();

		err = AddProxyToList(proxyInformation);
		
		if (err == KErrNone)
			{
			
			if (iActiveInformation.iSupported == EFalse)
				{
				iActiveInformation.iSupported = ETrue;
				iActiveInformation.iSupportsIncremental = EFalse;
				iStatus = EDataOwnerNotConnected;
				}
				
			}
		
		OstTraceExt2(TRACE_NORMAL, CDATAOWNER_HANDLECENREPBACKUP, "(0x%08x) - proxy creation error: %d", iSecureId.iId, static_cast<TInt32>(err));
		OstTraceFunctionExit0( CDATAOWNER_HANDLECENREPBACKUP_EXIT );
		return err;
		}

	TInt CDataOwner::HandleProxyDataManager(const RAttributeArray& aAttributes)
	/** Handles the "proxy_data_manager" element

	@param aAttributes the attributes for the element
	@return KErrNone
	*/
		{	
		OstTraceFunctionEntry0( CDATAOWNER_HANDLEPROXYDATAMANAGER_ENTRY );
		TInt err = KErrNone;
		
		TProxyInformation proxyInformation;
		
		const TDesC8& localName = aAttributes[0].Attribute().LocalName().DesC();
		if (!localName.CompareF(KProxySID))
			{
			// The value returned from the XML element attribute parse
			const TDesC8& hexString = aAttributes[0].Value().DesC();
			TPtrC8 strippedSID;
			
			// Test for lower case hex leader chars
			TInt result = hexString.FindF(KHexLeader);

			if (result != KErrNotFound)
				{
				if (hexString.Length() < (result + KHexLeader().Size()))
					{
				    OstTrace1(TRACE_NORMAL, CDATAOWNER_HANDLEPROXYDATAMANAGER, "The Hex number has incorrect number of digits for 0x%08x", iSecureId.iId);
					}
				// Strip off the preceeding upper case hex leader characters
				strippedSID.Set(hexString.Mid(result + KHexLeader().Size()));
				}
			else
				{
				// There were no leading characters in the data
				strippedSID.Set(hexString);
				}
			
			TLex8 sIdLex(strippedSID);
			err = sIdLex.Val(proxyInformation.iSecureId.iId, EHex);
			
			if (err == KErrNone && proxyInformation.iSecureId.iId != iSecureId.iId)
				{
				err = AddProxyToList(proxyInformation);
				
				if (err == KErrNone)
					{
					if (iActiveInformation.iSupported == EFalse)
						{
						iActiveInformation.iSupported = ETrue;
						iActiveInformation.iSupportsIncremental = EFalse;
						iStatus = EDataOwnerNotConnected;
						}
					}
        		
				OstTraceExt3(TRACE_NORMAL, DUP1_CDATAOWNER_HANDLEPROXYDATAMANAGER, "(0x%08x) - proxy creation error: %d for proxySid: 0x%08x", iSecureId.iId, static_cast<TInt32>(err), proxyInformation.iSecureId.iId);
				}
			else 
				{
			    OstTrace1(TRACE_NORMAL, DUP2_CDATAOWNER_HANDLEPROXYDATAMANAGER, "Not a Hex Number specified in reg_file of 0x%08x)", iSecureId.iId);
				err = KErrNone;		// We shouldn't return an error unless Append has errored (OOM etc.)
				}
			} // else it's corrupt - don't error, just ignore this attribute
		
		OstTraceFunctionExit0( CDATAOWNER_HANDLEPROXYDATAMANAGER_EXIT );
		return err;
		}

	TInt CDataOwner::HandleDBMSBackupL(const RAttributeArray& aAttributes)
	/** Handles the "dbms_backup" element

	@param aAttributes the attributes for the element
	@return KErrNone
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_HANDLEDBMSBACKUPL_ENTRY );
		iPassiveInformation.iSupported = ETrue;
		
		const TInt count = aAttributes.Count();
		for (TInt x = 0; x < count; x++)
			{
			const TDesC8& localName = aAttributes[x].Attribute().LocalName().DesC();
			if (localName.Length() > 0)
				{
				if (!localName.CompareF(KDatabase))
					{
				    OstTrace1(TRACE_NORMAL, CDATAOWNER_HANDLEDBMSBACKUPL, "(0x%08x) - Still using deprecated 'database' attribute", iSecureId.iId);
					}
				else if (!localName.CompareF(KPolicy))
					{
					TName policy;
					if (KErrNone == ipDataOwnerManager->ParserProxy().ConvertToUnicodeL(policy, aAttributes[x].Value().DesC()))
						{
						TLex lex(policy);
						TUint32 temp;
						lex.Val(temp, EHex);
						
						// Check we have not seen this Uid before
						const TInt count = iDBMSSelections.Count();
						TBool toAdd = ETrue;
						for (TInt x = 0; toAdd && (x < count); x++)
							{
							if (iDBMSSelections[x].iUid == temp)
								{
								toAdd = EFalse;
								} // if
							} // for
						
						// Add to list of Uid's
						if (toAdd)
							{
						    OstTraceExt2(TRACE_NORMAL, DUP1_CDATAOWNER_HANDLEDBMSBACKUPL, "(0x%08x) - adding database with policy uid: 0x%08x", iSecureId.iId, temp);
							TUid tempUID;
							tempUID.iUid = temp;
							TRAP_IGNORE(iDBMSSelections.AppendL(tempUID));
							} // if
						} // if
					else
						{
					    OstTrace1(TRACE_NORMAL, DUP2_CDATAOWNER_HANDLEDBMSBACKUPL, "(0x%08x) - Error converting policy number", iSecureId.iId);
						} // else
					} // else if
				} // if
			else
				{
			    OstTrace1(TRACE_NORMAL, DUP3_CDATAOWNER_HANDLEDBMSBACKUPL, "(0x%08x) - Incorrect use of attributes", iSecureId.iId);
				}
			} // for x
			
		OstTraceFunctionExit0( CDATAOWNER_HANDLEDBMSBACKUPL_EXIT );
		return KErrNone;
	}

	TInt CDataOwner::HandleActiveBackupL(const RAttributeArray& aAttributes)
	/** Handles the "active_backup" element

	@param aAttributes the attributes for the element
	@return KErrNone
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_HANDLEACTIVEBACKUPL_ENTRY );
		iActiveInformation.iSupported = ETrue;
		iActiveInformation.iActiveDataOwner = ETrue;
		iStatus = EDataOwnerNotConnected;
		
		const TInt count = aAttributes.Count();
		for (TInt x = 0; (iActiveInformation.iSupported && (x < count)); x++)
			{
			const TDesC8& localName = aAttributes[x].Attribute().LocalName().DesC();
			if (!localName.CompareF(KProcessName))
				{
				if (KErrNone != ipDataOwnerManager->ParserProxy().ConvertToUnicodeL(iActiveInformation.iProcessName, aAttributes[x].Value().DesC()))
					{
					iActiveInformation.iSupported = EFalse;
					OstTrace1(TRACE_NORMAL, CDATAOWNER_HANDLEACTIVEBACKUPL, "(0x%08x) - Error converting process name", iSecureId.iId);
					}
				}
			else if (!localName.CompareF(KRequiresDelay))
				{
                const TBool required = ( aAttributes[x].Value().DesC().CompareF(KYes) == 0 );
				iActiveInformation.iRequiresDelayToPrepareData = required;
				OstTraceExt2(TRACE_NORMAL, DUP1_CDATAOWNER_HANDLEACTIVEBACKUPL, "(0x%08x) - iActiveInformation.iRequiresDelayToPrepareData: %d", iSecureId.iId, static_cast<TInt32>(required));
				} // else if
			else if (!localName.CompareF(KSupportsSelective))
				{
                const TBool required = ( aAttributes[x].Value().DesC().CompareF(KYes) == 0 );
				iActiveInformation.iSupportsSelective = required;
				OstTraceExt2(TRACE_NORMAL, DUP2_CDATAOWNER_HANDLEACTIVEBACKUPL, "(0x%08x) - iActiveInformation.iSupportsSelective: %d", iSecureId.iId, static_cast<TInt32>(required));
				} // else if
			else if (!localName.CompareF(KSupportsInc))
				{
                const TBool required = ( aAttributes[x].Value().DesC().CompareF(KYes) == 0 );
				iActiveInformation.iSupportsIncremental = required;
				OstTraceExt2(TRACE_NORMAL, DUP3_CDATAOWNER_HANDLEACTIVEBACKUPL, "(0x%08x) - iActiveInformation.iSupportsIncremental: %d", iSecureId.iId, static_cast<TInt32>(required));
				} // else if
			else if (!localName.CompareF(KActiveType))
				{
				const TDesC8& value = aAttributes[x].Value().DesC();
				if (!value.CompareF(KActiveOnly))
					{
				    OstTrace1(TRACE_NORMAL, DUP4_CDATAOWNER_HANDLEACTIVEBACKUPL, "(0x%08x) - iActiveInformation.iActiveType: EActiveOnly", iSecureId.iId);
					iActiveInformation.iActiveType = EActiveOnly;
					}
				else if (!value.CompareF(KActiveAndProxy))
					{
				    OstTrace1(TRACE_NORMAL, DUP5_CDATAOWNER_HANDLEACTIVEBACKUPL, "(0x%08x) - iActiveInformation.iActiveType: EActiveAndProxyImpl", iSecureId.iId);
					iActiveInformation.iActiveType = EActiveAndProxyImpl;
					}
				else if (!value.CompareF(KProxyOnly))
					{
				    OstTrace1(TRACE_NORMAL, DUP6_CDATAOWNER_HANDLEACTIVEBACKUPL, "(0x%08x) - iActiveInformation.iActiveType: EProxyImpOnly", iSecureId.iId);
					iActiveInformation.iActiveType = EProxyImpOnly;
					}
				}
			else if(!localName.CompareF(KCallbackDelayTime))
				{
				const TDesC8& value = aAttributes[x].Value().DesC();
				TInt timeValue = 0;
				TLex8 lex(value);
				TInt err = lex.Val(timeValue);
				if( err == KErrNone && timeValue > 0)
					iActiveInformation.iCallbackDelayTime = TTimeIntervalMicroSeconds32(timeValue);
				else
					iActiveInformation.iCallbackDelayTime = KABCallbackDefaultTimeout;
				}
			} // for x
		
		OstTraceFunctionExit0( CDATAOWNER_HANDLEACTIVEBACKUPL_EXIT );
		return KErrNone;
		}


	TInt CDataOwner::HandleRestore(const RAttributeArray& aAttributes)
	/** Handles the "restore" element

	@param aAttributes the attributes for the element
	@return KErrNone
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_HANDLERESTORE_ENTRY );
		iRestoreInformation.iSupported = ETrue;
		
		if (aAttributes.Count() == 1)
			{
			if (!aAttributes[0].Attribute().LocalName().DesC().CompareF(KRequiresReboot))
				{
                const TBool required = ( aAttributes[0].Value().DesC().CompareF(KYes) == 0 );
				iRestoreInformation.iRequiresReboot = required;
				OstTraceExt2(TRACE_NORMAL, CDATAOWNER_HANDLERESTORE, "(0x%08x) - iRestoreInformation.iRequiresReboot: %d", iSecureId.iId, static_cast<TInt32>(required));
				} // if
			} // if
		
		OstTraceFunctionExit0( CDATAOWNER_HANDLERESTORE_EXIT );
		return KErrNone;
		}


	void CDataOwner::HandlePathL(const TSelectionType aType, 
								  const RAttributeArray& aAttributes,
								  const TBool aDir)
	/** Handles the "include_file", "include_directory" and "exclude" elements

	@param aType The selection type 
	@param aAttributes The attributes for the element
	@param aDir The element was found in an <include_dir/> element?
	*/
		{
		OstTraceFunctionEntry0( CDATAOWNER_HANDLEPATHL_ENTRY );
		// Check we dont have a NULL string
		if (aAttributes[0].Value().DesC().Length() > 0)
			{
			TFileName filename;
			if (KErrNone != ipDataOwnerManager->ParserProxy().ConvertToUnicodeL(filename, aAttributes[0].Value().DesC()))
				{
			    OstTrace1(TRACE_NORMAL, CDATAOWNER_HANDLEPATHL, "(0x%08x) - EPassive - Could not convert filename", iSecureId.iId);
				OstTraceFunctionExit0( CDATAOWNER_HANDLEPATHL_EXIT );
				return;
				}
			else
				{
			    OstTraceExt3(TRACE_NORMAL, DUP1_CDATAOWNER_HANDLEPATHL, "(0x%08x) - path in the registration file is: %S [type: %d]", iSecureId.iId, filename, static_cast<TInt32>(aType));
				}
				
			// If it is a directory is do we add a trailing backslash,
			if (aDir && (filename[filename.Length() - 1] != '\\'))
				{
				filename.Append(KBackSlash);
				} // if	
				
	
			switch (iCurrentElement)
				{
			case EPassive:
					{
					TFileName selectionName;
					// first check for absolute path
					TInt offset = filename.FindC(*iPrivatePath);
					if (offset == KErrNotFound)
						{
						//check for collon path
						offset = filename.FindC(KColon);
						if (offset != KErrNotFound)
							{
							// someone other absoulute path
						    OstTraceExt2(TRACE_NORMAL, DUP2_CDATAOWNER_HANDLEPATHL, "(0x%08x) - Path is not recognised by the data owner : %S", iSecureId.iId, filename);
							OstTraceFunctionExit0( DUP1_CDATAOWNER_HANDLEPATHL_EXIT );
							return;
							}
						else
							{
							selectionName = *iPrivatePath;
							if (filename[0] == '\\')
								{
								// the filename begins with \, thefore we need to chop it off
								selectionName.SetLength(selectionName.Length() - 1);
								}
							selectionName.Append(filename);
							}
						}
					else
						{
						// get the path but not the drive (e.g c:) 
						selectionName.Copy(filename.Right(filename.Length() - offset) );
						}
						
					CSelection* selection = CSelection::NewLC(aType, selectionName);
					iPassiveSelections.AppendL(selection);
					CleanupStack::Pop(selection);
					OstTraceExt3(TRACE_NORMAL, DUP3_CDATAOWNER_HANDLEPATHL, "(0x%08x) - Added selection: %S [type: %d]", iSecureId.iId, selectionName, static_cast<TInt32>(aType));
					break;
					}
			case EPublic:
					{
					// check if path relative or absolute
					if (filename.FindC(KColon) != KErrNotFound)
						{
						CSelection* selection = CSelection::NewLC(aType, filename);
						iPublicSelections.AppendL(selection);
						CleanupStack::Pop(selection);
						OstTraceExt3(TRACE_NORMAL, DUP4_CDATAOWNER_HANDLEPATHL, "(0x%08x) - Added selection: %S [type: %d]", iSecureId.iId, filename, static_cast<TInt32>(aType));
						}
					else
						{
					    OstTraceExt3(TRACE_NORMAL, DUP5_CDATAOWNER_HANDLEPATHL, "(0x%08x) - Not an Absolute Path: %S [type: %d]", iSecureId.iId, filename, static_cast<TInt32>(aType));
						OstTraceFunctionExit0( DUP2_CDATAOWNER_HANDLEPATHL_EXIT );
						return;
						}
					break;
					}
				} // switch
			} // if
		else
			{
		    OstTrace1(TRACE_NORMAL, DUP6_CDATAOWNER_HANDLEPATHL, "(0x%08x) - Path attribute error", iSecureId.iId);
			} // else
		OstTraceFunctionExit0( DUP3_CDATAOWNER_HANDLEPATHL_EXIT );
		}
		
		
	CSnapshotHolder* CSnapshotHolder::NewL()
	/** Symbain OS constructor

	@return a CSnapshotHolder object
	*/
		{
		OstTraceFunctionEntry0( CSNAPSHOTHOLDER_NEWL_ENTRY );
		CSnapshotHolder* self = NewLC();
		CleanupStack::Pop(self);
		
		OstTraceFunctionExit0( CSNAPSHOTHOLDER_NEWL_EXIT );
		return self;
		}

	CSnapshotHolder* CSnapshotHolder::NewLC()
	/** Symbain OS constructor
	
	@return a CSnapshotHolder object
	*/
		{
		OstTraceFunctionEntry0( CSNAPSHOTHOLDER_NEWLC_ENTRY );
		CSnapshotHolder* self = new(ELeave) CSnapshotHolder();
		CleanupStack::PushL(self);
		
		OstTraceFunctionExit0( CSNAPSHOTHOLDER_NEWLC_EXIT );
		return self;
		}
		
	CSnapshotHolder::CSnapshotHolder()
	/** Default C++ Constructor
	*/
		{
		OstTraceFunctionEntry0( CSNAPSHOTHOLDER_CSNAPSHOTHOLDER_CONS_ENTRY );
		OstTraceFunctionExit0( CSNAPSHOTHOLDER_CSNAPSHOTHOLDER_CONS_EXIT );
		}
		
	CSnapshotHolder::~CSnapshotHolder()
	/** Default C++ Constructor
	*/
		{
		OstTraceFunctionEntry0( CSNAPSHOTHOLDER_CSNAPSHOTHOLDER_DES_ENTRY );
		iSnapshots.ResetAndDestroy();
		OstTraceFunctionExit0( CSNAPSHOTHOLDER_CSNAPSHOTHOLDER_DES_EXIT );
		}
			
		
	} // namespace conn