/* * Copyright (C) 2021 Huawei Device Co., Ltd. * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include "telephony_permission.h" #include "bundle_mgr_interface.h" #include "if_system_ability_manager.h" #include "ipc_skeleton.h" #include "iservice_registry.h" #include "system_ability_definition.h" #include "accesstoken_kit.h" #include "privacy_kit.h" #include "telephony_log_wrapper.h" namespace OHOS { namespace Telephony { using namespace Security::AccessToken; /** * @brief Get bundleName by callingUid. * @param callingUid. * @param bundleName. * @return Returns true on success, false on failure. */ bool TelephonyPermission::GetBundleNameByUid(int32_t uid, std::string &bundleName) { OHOS::sptr systemAbilityManager = OHOS::SystemAbilityManagerClient::GetInstance().GetSystemAbilityManager(); OHOS::sptr remoteObject = systemAbilityManager->GetSystemAbility(BUNDLE_MGR_SERVICE_SYS_ABILITY_ID); sptr iBundleMgr = OHOS::iface_cast(remoteObject); if (iBundleMgr == nullptr) { TELEPHONY_LOGE(" permission check failed, cannot get IBundleMgr."); return false; } return iBundleMgr->GetBundleNameForUid(uid, bundleName); } /** * @brief Permission check by callingUid. * @param permissionName permission name. * @return Returns true on success, false on failure. */ bool TelephonyPermission::CheckPermission(const std::string &permissionName) { if (permissionName.empty()) { TELEPHONY_LOGE("permission check failed,permission name is empty."); return false; } auto callerToken = IPCSkeleton::GetCallingTokenID(); auto tokenType = AccessTokenKit::GetTokenTypeFlag(callerToken); int result = PermissionState::PERMISSION_DENIED; if (tokenType == ATokenTypeEnum::TOKEN_NATIVE) { result = PermissionState::PERMISSION_GRANTED; } else if (tokenType == ATokenTypeEnum::TOKEN_HAP) { result = AccessTokenKit::VerifyAccessToken(callerToken, permissionName); } else { TELEPHONY_LOGE("permission check failed, callerToken:%{public}u, tokenType:%{public}d", callerToken, tokenType); } if (permissionName == Permission::ANSWER_CALL || permissionName == Permission::READ_CALL_LOG || permissionName == Permission::READ_CONTACTS || permissionName == Permission::WRITE_CONTACTS || permissionName == Permission::SEND_MESSAGES) { if (tokenType == ATokenTypeEnum::TOKEN_HAP) { bool status = result == PermissionState::PERMISSION_GRANTED; int32_t successCount = status ? 1 : 0; int32_t failCount = status ? 0 : 1; int32_t ret = PrivacyKit::AddPermissionUsedRecord(callerToken, permissionName, successCount, failCount); if (ret != 0) { TELEPHONY_LOGE("AddPermissionUsedRecord failed, permission:%{public}s, " "successCount:%{public}d, failCount:%{public}d", permissionName.c_str(), successCount, failCount); } } } if (result != PermissionState::PERMISSION_GRANTED) { TELEPHONY_LOGE("permission check failed, permission:%{public}s, callerToken:%{public}u, tokenType:%{public}d", permissionName.c_str(), callerToken, tokenType); return false; } return true; } } // namespace Telephony } // namespace OHOS