diff -r 48780e181b38 -r 578be2adaf3e Symbian3/PDK/Source/GUID-9E4D75C0-D797-5541-8E52-3C6D154CC74A.dita
--- a/Symbian3/PDK/Source/GUID-9E4D75C0-D797-5541-8E52-3C6D154CC74A.dita Tue Jul 20 12:00:49 2010 +0100
+++ b/Symbian3/PDK/Source/GUID-9E4D75C0-D797-5541-8E52-3C6D154CC74A.dita Fri Aug 13 16:47:46 2010 +0100
@@ -1,87 +1,87 @@
-
-
-
-
-
- The Symbian Platform Security Architecture is designed to provide defences
-against malicious or badly implemented code. The following aspects of platform
-security are particularly relevant to the ECom plug-in architecture: The platform security
-capability model, which protects processes from loading and using DLLs
-that are less secure than the process itself. Control over software
-installation, so that insecure software cannot disrupt legitimately installed
-software. Control over which processes
-have access to particular files. For more information on the Platform Security Architecture, see Symbian
-OS v9 Security Architecture in the The
-Platform Security Architecture protects processes against loading and using
-DLLs that are less secure than the processes themselves. This is done using
-platform security capabilities assigned to the process and the DLL. The rule
-applied is that the DLL must have the same or greater capabilities than the
-process in which it is loaded. With ECom, a plug-in is a DLL that
-is loaded into a client process when an interface implementation provided
-by that DLL is instantiated. If the plug-in DLL has lower capabilities than
-the loading process, then a "permission denied" (-46) error is returned. See Providers
-of plug-in DLLs must consider the following with respect to platform security
-capabilities: If you give a plug-in
-DLL no capabilities, it can only be used by client processes that also have
-no capabilities. If you intend a plug-in
-to work only with one client program, such as a particular server, then the
-documentation for that program should tell you what capabilities it needs. If you want a plug-in
-to be usable by any program (apart from the kernel and the file server), then
-the capability setting Custom resolver plug-ins
-are a special case. They are loaded by a server process in ECom itself, and
-so must be trusted by that server. This requires that you give the plug-in
-the Platform security also allows you to specify that clients should
-only use plug-in implementations supplied by a particular company. See Under Platform
-Security, the Software Installer program controls what software is installed
-to the device. It enables programs originally delivered in ROM, including
-ECom plugins, to be upgraded securely. Before platform security, applications
-could chose to use only ROM-based plug-ins. This guaranteed that the plug-ins
-were secure, but did not allow upgrades. Alternatively, both ROM-based and
-installed plug-ins were used, which allowed upgrades, but also risked the
-use of possibly insecure plug-ins. Platform security improves this
-situation, as it allows clients to access securely both ROM-based plug-ins
-and any installed upgrades to those plug-ins. For more information for how
-clients can do this, see Providers of ROM-based plug-ins should
-see The Platform Security architecture
-tightly controls access to executable code by: requiring that all such code, including plug-in DLLs, is located under
-a directory restricting access to that directory to a small number of key system
-processes.
-
-
-
-
The registration resource file for a plug-in must be readable
-by ECom, but should not be alterable after installation. For this reason,
-registration resource files are always installed to the read-only directory
To
-build plug-in code to these locations, set the target type in the project
-file to
The Symbian Platform Security Architecture is designed to provide defences +against malicious or badly implemented code. The following aspects of platform +security are particularly relevant to the ECom plug-in architecture:
+The platform security +capability model, which protects processes from loading and using DLLs +that are less secure than the process itself.
Control over software +installation, so that insecure software cannot disrupt legitimately installed +software.
Control over which processes +have access to particular files.
For more information on the Platform Security Architecture, see Symbian
+OS v9 Security Architecture in the
The +Platform Security Architecture protects processes against loading and using +DLLs that are less secure than the processes themselves. This is done using +platform security capabilities assigned to the process and the DLL. The rule +applied is that the DLL must have the same or greater capabilities than the +process in which it is loaded.
With ECom, a plug-in is a DLL that
+is loaded into a client process when an interface implementation provided
+by that DLL is instantiated. If the plug-in DLL has lower capabilities than
+the loading process, then a "permission denied" (-46) error is returned. See
Providers +of plug-in DLLs must consider the following with respect to platform security +capabilities:
If you give a plug-in +DLL no capabilities, it can only be used by client processes that also have +no capabilities.
If you intend a plug-in +to work only with one client program, such as a particular server, then the +documentation for that program should tell you what capabilities it needs.
If you want a plug-in
+to be usable by any program (apart from the kernel and the file server), then
+the capability setting
Custom resolver plug-ins
+are a special case. They are loaded by a server process in ECom itself, and
+so must be trusted by that server. This requires that you give the plug-in
+the
Platform security also allows you to specify that clients should
+only use plug-in implementations supplied by a particular company. See
Under Platform +Security, the Software Installer program controls what software is installed +to the device. It enables programs originally delivered in ROM, including +ECom plugins, to be upgraded securely.
Before platform security, applications +could chose to use only ROM-based plug-ins. This guaranteed that the plug-ins +were secure, but did not allow upgrades. Alternatively, both ROM-based and +installed plug-ins were used, which allowed upgrades, but also risked the +use of possibly insecure plug-ins.
Platform security improves this
+situation, as it allows clients to access securely both ROM-based plug-ins
+and any installed upgrades to those plug-ins. For more information for how
+clients can do this, see
Providers of ROM-based plug-ins should
+see
The Platform Security architecture +tightly controls access to executable code by:
requiring that all such code, including plug-in DLLs, is located under
+a directory
restricting access to that directory to a small number of key system +processes.
The registration resource file for a plug-in must be readable
+by ECom, but should not be alterable after installation. For this reason,
+registration resource files are always installed to the read-only directory
To
+build plug-in code to these locations, set the target type in the project
+file to