cryptomgmtlibs/securitycommonutils/source/securityutils/securityutils.cpp
changeset 8 35751d3474b7
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitycommonutils/source/securityutils/securityutils.cpp	Thu Sep 10 14:01:51 2009 +0300
@@ -0,0 +1,131 @@
+/*
+* Copyright (c) 2008-2009 Nokia Corporation and/or its subsidiary(-ies).
+* All rights reserved.
+* This component and the accompanying materials are made available
+* under the terms of the License "Eclipse Public License v1.0"
+* which accompanies this distribution, and is available
+* at the URL "http://www.eclipse.org/legal/epl-v10.html".
+*
+* Initial Contributors:
+* Nokia Corporation - initial contribution.
+*
+* Contributors:
+*
+* Description: 
+* Common security functions
+*
+*/
+
+
+/**
+ @file
+*/
+
+
+#include "securityutils.h"
+
+#include <f32file.h>
+
+// Extracts the next sub-dir name, i.e. "directory1" for "directory1\directory2\...". As a second parameter, returns the remaining path without the leading slash 
+// Return ETrue iff a directory was found in the path
+ TBool GetNextDirNameL(const TPtrC& aPath, TPtrC& aNextDir, TPtrC& aRemainingPath)
+	{
+	TInt nextSlashPos = aPath.Locate('\\');
+	if (nextSlashPos < 0)
+		return EFalse;
+	
+	aNextDir.Set(aPath.Left(nextSlashPos));
+	TPtrC remainingPath = nextSlashPos <  aPath.Length() - 1 ? aPath.Mid(nextSlashPos + 1) : TPtrC();
+	aRemainingPath.Set(remainingPath);
+	
+	return ETrue;
+	}
+
+TCapabilitySet PrivateModificationRequiredCapabilitiesL(const TDesC& aPrivateSubPath, TSecureId aClientSid)
+	{
+	TPtrC privateSubDirName;
+	TPtrC remainingSubPath;
+	TBool nextDirAvailable = GetNextDirNameL(aPrivateSubPath, privateSubDirName, remainingSubPath);
+	// Filter out paths which do not have a /private/<SID> form - require TCB for them
+	// First, filter out files directly under the /private directory
+	if (!nextDirAvailable)
+		return TCapabilitySet(ECapabilityTCB);
+	    	
+	if (privateSubDirName.Length() != 8)
+		return TCapabilitySet(ECapabilityTCB); // Filter out sub-dir names which do not have 8 bytes, i.e. do not represent a SID
+	
+	TLex hexConverter(privateSubDirName);
+	TUint32 foundSecureIdInt;
+	if (hexConverter.Val(foundSecureIdInt, EHex) != KErrNone)
+		return TCapabilitySet(ECapabilityTCB); // Filter out paths which do not have a <secureId> subdir under private
+	
+	TSecureId foundSecureId(foundSecureIdInt);
+	if (foundSecureId != aClientSid) // Check whether this the client's SID
+		{
+		TPtrC nextSubPath; // Check for /private/<SID>/import directories
+		TPtrC nextSubDir;
+		if (!GetNextDirNameL(remainingSubPath, nextSubDir, nextSubPath) || nextSubDir.CompareF(_L("import")) != 0)
+			{
+			// If not an import directory, require TCB or AllFiles
+			TCapabilitySet ret(ECapabilityTCB);
+			ret.AddCapability(ECapabilityAllFiles);
+			return ret;			
+			}
+		}
+	
+	TCapabilitySet emptySet;
+	emptySet.SetEmpty();
+	return emptySet;
+	}
+ 
+EXPORT_C TCapabilitySet SecCommonUtils::FileModificationRequiredCapabilitiesL(const TDesC& aFileName, TSecureId aClientSid)
+	{
+	TCapabilitySet emptySet;
+	emptySet.SetEmpty();	
+	
+	// TParsePtrC is unusable, since it panics on incorrect paths. We have to use TParse and create a temporary buffer for it (as there's no TParseC)
+	RBuf tempbuf;
+	tempbuf.CreateL(aFileName);
+	tempbuf.CleanupClosePushL();
+	
+	TParse pathParse;
+	if (pathParse.Set(tempbuf, NULL, NULL) != KErrNone)
+		{
+		CleanupStack::PopAndDestroy(&tempbuf);
+		// Path failed to parse - require TCB, as it is the only capability which allows modification anywhere on the FS
+		// (and we do not know where on the FS this file is)
+		return TCapabilitySet(ECapabilityTCB); 
+		}
+		
+	CleanupStack::PopAndDestroy(&tempbuf);
+
+	// check for wild cards (such as * or ?) in paths 
+    if(pathParse.IsWild())
+        return TCapabilitySet(ECapabilityTCB);
+
+	// check for relative paths
+    if(aFileName.Find(_L("..")) != KErrNotFound)
+        return TCapabilitySet(ECapabilityTCB);
+
+    TPtrC pathTmp = pathParse.Path();
+    if (pathTmp.Length() <= 1) // The should be at least one directory - otherwise there's nothing to check
+    	return emptySet;
+    
+    // Get the first directory name    
+    TPtrC path = pathTmp.Mid(1); // Remove the leading slash
+    
+    TPtrC firstDirName;
+    TPtrC remainingPath;
+    TBool nextDirAvailable = GetNextDirNameL(path, firstDirName, remainingPath);
+    __ASSERT_ALWAYS(nextDirAvailable, User::Invariant()); // There should be at least one directory if the Path() was not empty
+        
+    // For 'sys' or 'resource', require TCB
+    if (firstDirName.CompareF(_L("sys")) == 0 || firstDirName.CompareF(_L("resource")) == 0)
+    	return TCapabilitySet(ECapabilityTCB);
+    
+    if (firstDirName.CompareF(_L("private")) == 0)
+    	return PrivateModificationRequiredCapabilitiesL(remainingPath, aClientSid);
+    	
+    // If the directory name is not 'private', 'resource' or 'sys', no capabilities are required
+	return emptySet;
+	}