Trusted APIs (Windows CE 5.0)
The following table shows the API functions that can be called only by trusted applications.
The following table shows file-based API functions that are influenced by the SYSTEM attribute that can be set on a file. For more information, see File System Security.
The following table shows database API functions that are influenced by the SYSTEM attribute that can be set on a database. For more information, see Database Security.
In addition, the debug flags DEBUG_ONLY_THIS_PROCESS and DEBUG_PROCESS of the CreateProcess API are restricted. If these flags are used by a non-trusted application, the identified process will still launch but no debugging will occur.
Debug flags, DEBUG_ONLY_THIS_PROCESS and DEBUG_PROCESS, in the CreateProcess API are restricted as well.
The secure registry architecture in Windows CE allows only trusted applications that you have identified to modify keys and values in protected portions of the registry.
Because most of the registry is unprotected, original equipment manufacturers must place all-important registry information in one of the protected keys.
Note All applications have read-only access to all registry keys and values.
In Windows CE, the following registry root keys and their subkeys are protected from untrusted applications:
Untrusted applications are also not allowed to modify protected data. They receive the ERROR_ACCESS_DENIED return value if they attempt to use the following registry functions:
Windows Mobile 5.0
In Windows Mobile 5.0 software there are additional APIs and registry root keys that are also protected from untrusted applications.
The following table shows the Extended Telephony Application Program Interface (ExTAPI) functions that can be called by trusted applications.
The following table shows the SIM Manager functions that can be called by trusted applications.
The following table shows the Short Message Service (SMS) functions that can be called by trusted applications.
The following table shows other functions that can be called by trusted applications.
|Connection Manager function ConnMgrProviderMessage|
|Critical Process Monitor function CPMRegister (Reboot)|
In Windows Mobile 5.0-based devices, the following registry root keys and subkeys are protected from untrusted applications in addition the list for Windows CE:
Send Feedback on this topic to the authors