userlibandfileserver/fileserver/sfile/sf_utl.cpp
changeset 299 b5a01337d018
parent 254 1560c419b176
--- a/userlibandfileserver/fileserver/sfile/sf_utl.cpp	Tue Oct 26 12:49:20 2010 +0100
+++ b/userlibandfileserver/fileserver/sfile/sf_utl.cpp	Mon Nov 01 20:11:36 2010 +0000
@@ -133,14 +133,14 @@
 	return ETrue;
 	}
 
-TBool SIDCheck(CFsRequest* aRequest, const TDesC& aThePath)
+TBool SIDCheck(const RMessage2& aMessage, const TDesC& aThePath)
 //
 //	Compare the Private/XXXXXXXX/ portion of a path be accessed to make sure it matches the process SID 
 //
 	{
 	if(aThePath.Length() >= KPrivateLengthCheck)
 		{
-		TSecureId appUID = aRequest->Message().SecureId();
+        TSecureId appUID = aMessage.SecureId();
 		TBuf<KSIDLength+1> dirName;
 		dirName.AppendNumFixedWidth(appUID.iId, EHex, 8);
 	
@@ -155,16 +155,16 @@
 	}
 
 #ifndef __REMOVE_PLATSEC_DIAGNOSTIC_STRINGS__
-TInt PathCheck(CFsRequest* aRequest, const TDesC& aThePath, const TSecurityPolicy* aSysCap, const TSecurityPolicy* aPriCap, const TSecurityPolicy* aROCap, const char* aDiag)
+TInt PathCheck(const RMessage2& aMessage, const TDesC& aThePath, const TSecurityPolicy* aSysCap, const TSecurityPolicy* aPriCap, const TSecurityPolicy* aROCap, const char* aDiag)
 #else //__REMOVE_PLATSEC_DIAGNOSTIC_STRINGS__
-TInt PathCheck(CFsRequest* aRequest, const TDesC& aThePath, const TSecurityPolicy* aSysCap, const TSecurityPolicy* aPriCap, const TSecurityPolicy* aROCap, OnlyCreateWithNull /*aDiag*/)
+TInt PathCheck(const RMessage2& aMessage, const TDesC& aThePath, const TSecurityPolicy* aSysCap, const TSecurityPolicy* aPriCap, const TSecurityPolicy* aROCap, OnlyCreateWithNull /*aDiag*/)
 #endif //!__REMOVE_PLATSEC_DIAGNOSTIC_STRINGS__
 //
 //	Compare the parsed path with protected path names path must be parsed b4 using
 //
 	{
 
-	if(aRequest->Message().Handle() == KLocalMessageHandle)
+	if(aMessage.Handle() == KLocalMessageHandle)
 		return KErrNone;
 
 #ifndef __REMOVE_PLATSEC_DIAGNOSTIC_STRINGS__
@@ -185,11 +185,11 @@
 
 	if(ComparePrivate(aThePath))
 		{	
-		if(SIDCheck(aRequest, aThePath))
+		if(SIDCheck(aMessage, aThePath))
 			return KErrNone;	
 		else
 			{
-			if(aPriCap->CheckPolicy(aRequest->Message(), __PLATSEC_DIAGNOSTIC_STRING(diagout)))
+			if(aPriCap->CheckPolicy(aMessage, __PLATSEC_DIAGNOSTIC_STRING(diagout)))
 				return KErrNone;
 			else
 				return KErrPermissionDenied;
@@ -197,14 +197,14 @@
 		}
 	else if(CompareSystem(aThePath))
 		{
-		if(aSysCap->CheckPolicy(aRequest->Message(), __PLATSEC_DIAGNOSTIC_STRING(diagout)))
+		if(aSysCap->CheckPolicy(aMessage, __PLATSEC_DIAGNOSTIC_STRING(diagout)))
 			return KErrNone;
 		else
 			return KErrPermissionDenied;
 		}
 	else if(CompareResource(aThePath))
 		{
-		if(aROCap->CheckPolicy(aRequest->Message(), __PLATSEC_DIAGNOSTIC_STRING(diagout)))
+		if(aROCap->CheckPolicy(aMessage, __PLATSEC_DIAGNOSTIC_STRING(diagout)))
 			return KErrNone;
 		else
 			return KErrPermissionDenied;
@@ -214,16 +214,16 @@
  	}
 
 #ifndef __REMOVE_PLATSEC_DIAGNOSTIC_STRINGS__
-TInt PathCheck(CFsRequest* aRequest, const TDesC& aThePath, const TSecurityPolicy* aSysCap, const TSecurityPolicy* aPriCap, const char* aDiag) 
+TInt PathCheck(const RMessage2& aMessage, const TDesC& aThePath, const TSecurityPolicy* aSysCap, const TSecurityPolicy* aPriCap, const char* aDiag) 
 #else //__REMOVE_PLATSEC_DIAGNOSTIC_STRINGS__
-TInt PathCheck(CFsRequest* aRequest, const TDesC& aThePath, const TSecurityPolicy* aSysCap, const TSecurityPolicy* aPriCap, OnlyCreateWithNull /*aDiag*/) 
+TInt PathCheck(const RMessage2& aMessage, const TDesC& aThePath, const TSecurityPolicy* aSysCap, const TSecurityPolicy* aPriCap, OnlyCreateWithNull /*aDiag*/) 
 #endif //!__REMOVE_PLATSEC_DIAGNOSTIC_STRINGS__
 //
 //	Compare the parsed path with protected path names path must be parsed b4 using
 //
 	{
 
-	if(aRequest->Message().Handle() == KLocalMessageHandle)
+	if(aMessage.Handle() == KLocalMessageHandle)
 		return KErrNone;
 
 #ifndef __REMOVE_PLATSEC_DIAGNOSTIC_STRINGS__
@@ -244,11 +244,11 @@
 
 	if(ComparePrivate(aThePath))
 		{	
-		if(SIDCheck(aRequest, aThePath))
+		if(SIDCheck(aMessage, aThePath))
 			return KErrNone;	
 		else
 			{
-			if(aPriCap->CheckPolicy(aRequest->Message(), __PLATSEC_DIAGNOSTIC_STRING(diagout)))
+			if(aPriCap->CheckPolicy(aMessage, __PLATSEC_DIAGNOSTIC_STRING(diagout)))
 				return KErrNone;
 			else
 				return KErrPermissionDenied;
@@ -256,7 +256,7 @@
 		}
 	else if(CompareSystem(aThePath))
 		{
-		if(aSysCap->CheckPolicy(aRequest->Message(), __PLATSEC_DIAGNOSTIC_STRING(diagout)))
+		if(aSysCap->CheckPolicy(aMessage, __PLATSEC_DIAGNOSTIC_STRING(diagout)))
 			return KErrNone;
 		else
 			return KErrPermissionDenied;
@@ -266,16 +266,16 @@
  	}
 
 #ifndef __REMOVE_PLATSEC_DIAGNOSTIC_STRINGS__
-TInt PathCheck(CFsRequest* aRequest, const TDesC& aThePath, const TSecurityPolicy* aCap, const char* aDiag, TBool aExactMatchAllowed) 
+TInt PathCheck(const RMessage2& aMessage, const TDesC& aThePath, const TSecurityPolicy* aCap, const char* aDiag, TBool aExactMatchAllowed) 
 #else //__REMOVE_PLATSEC_DIAGNOSTIC_STRINGS__
-TInt PathCheck(CFsRequest* aRequest, const TDesC& aThePath, const TSecurityPolicy* aCap, OnlyCreateWithNull /*aDiag*/, TBool aExactMatchAllowed) 
+TInt PathCheck(const RMessage2& aMessage, const TDesC& aThePath, const TSecurityPolicy* aCap, OnlyCreateWithNull /*aDiag*/, TBool aExactMatchAllowed) 
 #endif //!__REMOVE_PLATSEC_DIAGNOSTIC_STRINGS__
 //
 //	Compare the parsed path with protected path names path must be parsed b4 using
 //
 	{
 
-	if(aRequest->Message().Handle() == KLocalMessageHandle)
+	if(aMessage.Handle() == KLocalMessageHandle)
 		return KErrNone;
 
 #ifndef __REMOVE_PLATSEC_DIAGNOSTIC_STRINGS__
@@ -296,11 +296,11 @@
 
 	if(ComparePrivate(aThePath))
 		{	
-		if(SIDCheck(aRequest, aThePath))
+		if(SIDCheck(aMessage, aThePath))
 			return KErrNone;	
 		else
 			{
-			if(aCap->CheckPolicy(aRequest->Message(), __PLATSEC_DIAGNOSTIC_STRING(diagout)))
+			if(aCap->CheckPolicy(aMessage, __PLATSEC_DIAGNOSTIC_STRING(diagout)))
 				return KErrNone;
 			else if (aExactMatchAllowed && aThePath.Length() <= KPrivateLength + 1)
 				return KErrNone;
@@ -310,7 +310,7 @@
 		}
 	else if(CompareSystem(aThePath))
 		{
-		if(aCap->CheckPolicy(aRequest->Message(), __PLATSEC_DIAGNOSTIC_STRING(diagout)))
+		if(aCap->CheckPolicy(aMessage, __PLATSEC_DIAGNOSTIC_STRING(diagout)))
 			return KErrNone;
 		else if (aExactMatchAllowed && aThePath.Length() <= KSystemLength + 1)
 			return KErrNone;