* for freeing allocated resources.
*
* Required privileges:
- * - http://tizen.org/privilege/internal/usermanagement
+ * - application can fetch its policy without any privilege (providing that filters'
+ * application name and user is the same as applications)
+ * - http://tizen.org/privilege/internal/usermanagement or http://tizen.org/privilege/permission.check
*
* \param[in] p_filter Pointer to filter struct
* \param[out] ppp_privs_policy Pointer handling allocated policy_entry structures array
*
* \attention Developer is responsible for calling security_manager_policy_entries_free()
* for freeing allocated resources.
-
+ *
* Required privileges:
* - application can fetch its policy without any privilege (providing that filters'
- application name and user is the same as applications)
- * - http://tizen.org/privilege/notexist
+ * application name and user is the same as applications)
+ * - http://tizen.org/privilege/notexist or http://tizen.org/privilege/permission.check
*
* \param[in] p_filter Pointer to filter struct
* \param[out] ppp_privs_policy Pointer handling allocated policy_entry structures array
* for freeing allocated resources.
*
* Required privileges:
- * - http://tizen.org/privilege/notexist (for fetching own policy)
- * - http://tizen.org/privilege/internal/usermanagement (for fetching policy for other or all)
+ * - http://tizen.org/privilege/notexist or
+ * http://tizen.org/privilege/permission.check (for fetching own policy)
+ * - http://tizen.org/privilege/internal/usermanagement or
+ * http://tizen.org/privilege/permission.check (for fetching policy for other or all)
*
* \param[in] p_filter Pointer to filter struct
* \param[out] ppp_privs_policy Pointer handling allocated policy_entry structures array
* to free allocated resources.
*
* Required privileges:
- * - http://tizen.org/privilege/internal/usermanagement
+ * for checking own manifest policy:
+ * - none
+ * for checking other app process manifest:
+ * - http://tizen.org/privilege/internal/usermanagement or http://tizen.org/privilege/permission.check
*
* \param[in] app_name Application identifier
* \param[in] uid Identifier of user under which the application is/can be running