+ return count ? PMINFO_R_OK : PMINFO_R_ENOENT;
+}
+
+static int _pkgmgrinfo_appinfo_foreach_appcontrol_privileges(uid_t uid,
+ const char *appid, const char *app_control,
+ pkgmgrinfo_pkg_privilege_list_cb callback, void *user_data)
+{
+ int ret;
+ char *dbpath;
+ sqlite3 *db;
+
+ dbpath = getUserPkgParserDBPathUID(uid);
+ if (dbpath == NULL)
+ return PMINFO_R_ERROR;
+
+ ret = __open_db(dbpath, &db, SQLITE_OPEN_READONLY);
+ free(dbpath);
+ if (ret != SQLITE_OK) {
+ LOGE("open db failed: %s", sqlite3_errmsg(db));
+ return PMINFO_R_ERROR;
+ }
+
+ ret = _appinfo_foreach_appcontrol_privileges(db, appid, app_control,
+ callback, user_data);
+ sqlite3_close_v2(db);
+
+ return ret;
+}
+
+API int pkgmgrinfo_appinfo_usr_foreach_appcontrol_privileges(const char *appid,
+ const char *operation, const char *uri, const char *mime,
+ pkgmgrinfo_pkg_privilege_list_cb privilege_func,
+ void *user_data, uid_t uid)
+{
+ int ret;
+ char app_control[BUFSIZE];
+
+ if (appid == NULL || operation == NULL || privilege_func == NULL) {
+ LOGE("invalid parameter");
+ return PMINFO_R_EINVAL;
+ }
+
+ snprintf(app_control, sizeof(app_control), "%s|%s|%s", operation,
+ uri ? uri : "NULL", mime ? mime : "NULL");
+
+ ret = _pkgmgrinfo_appinfo_foreach_appcontrol_privileges(GLOBAL_USER,
+ appid, app_control, privilege_func, user_data);
+ if (ret == PMINFO_R_ENOENT && uid != GLOBAL_USER)
+ ret = _pkgmgrinfo_appinfo_foreach_appcontrol_privileges(uid,
+ appid, app_control, privilege_func, user_data);
+
+ if (ret == PMINFO_R_ENOENT)
+ ret = PMINFO_R_OK;
+
+ return ret;