Add USB policy 61/143461/5 accepted/tizen/4.0/unified/20170920.081811 accepted/tizen/unified/20170921.072446 submit/tizen/20170920.045814 submit/tizen/20170921.042645 submit/tizen_4.0/20170920.045210
authorJaemin Ryu <jm77.ryu@samsung.com>
Thu, 10 Aug 2017 04:28:25 +0000 (13:28 +0900)
committerJaemin Ryu <jm77.ryu@samsung.com>
Thu, 14 Sep 2017 00:57:32 +0000 (00:57 +0000)
Change-Id: I2fdc934125a121080a939a97c4fb9f13e6eafa76
Signed-off-by: Jaemin Ryu <jm77.ryu@samsung.com>
CMakeLists.txt [new file with mode: 0755]
api/CMakeLists.txt [new file with mode: 0755]
api/dpm-usb.pc.in [new file with mode: 0644]
api/usb.cpp [new file with mode: 0644]
api/usb.h [new file with mode: 0644]
dpm-usb.manifest [new file with mode: 0644]
packaging/dpm-usb.spec [new file with mode: 0755]
plugin/CMakeLists.txt [new file with mode: 0755]
plugin/usb.cpp [new file with mode: 0644]

diff --git a/CMakeLists.txt b/CMakeLists.txt
new file mode 100755 (executable)
index 0000000..acda325
--- /dev/null
@@ -0,0 +1,85 @@
+#
+# Copyright (c) 2017 Samsung Electronics Co., Ltd All Rights Reserved
+#
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+#     http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+#
+
+CMAKE_MINIMUM_REQUIRED(VERSION 2.8)
+
+PROJECT(dpm-usb)
+
+IF(NOT DEFINED VERSION)
+       SET(VERSION "0.0.1")
+ENDIF(NOT DEFINED VERSION)
+
+INCLUDE(FindPkgConfig)
+
+IF(NOT CMAKE_BUILD_TYPE)
+       SET(CMAKE_BUILD_TYPE "DEBUG")
+ENDIF(NOT CMAKE_BUILD_TYPE)
+
+SET(DPM_API     ${PROJECT_SOURCE_DIR}/api)
+SET(DPM_PLUGIN  ${PROJECT_SOURCE_DIR}/plugin)
+
+IF("${CMAKE_CXX_COMPILER_ID}" STREQUAL "GNU" AND CMAKE_CXX_COMPILER_VERSION VERSION_LESS 4.7)
+       SET(CXX_STD "c++0x")
+else()
+       SET(CXX_STD "c++11")
+endif()
+
+SET(COMPILE_BASE_FLAGS         "-g -fPIC -Werror -Wall -Wl,--as-needed -Wl,--no-whole-archive")
+SET(CMAKE_C_FLAGS_PROFILING    "${COMPILE_BASE_FLAGS} -O0 -pg")
+SET(CMAKE_CXX_FLAGS_PROFILING  "${COMPILE_BASE_FLAGS} -O0 -pg -std=${CXX_STD} -fno-rtti")
+SET(CMAKE_C_FLAGS_DEBUG                "${COMPILE_BASE_FLAGS} -O0 -ggdb")
+SET(CMAKE_CXX_FLAGS_DEBUG      "${COMPILE_BASE_FLAGS} -O0 -ggdb -std=${CXX_STD} -fno-rtti")
+SET(CMAKE_C_FLAGS_RELEASE      "${COMPILE_BASE_FLAGS} -O2 -DNDEBUG")
+SET(CMAKE_CXX_FLAGS_RELEASE    "${COMPILE_BASE_FLAGS} -O2 -DNDEBUG -std=${CXX_STD} -fno-rtti")
+SET(CMAKE_C_FLAGS_CCOV         "${COMPILE_BASE_FLAGS} -O0 --coverage")
+SET(CMAKE_CXX_FLAGS_CCOV       "${COMPILE_BASE_FLAGS} -O0 --coverage -std=${CXX_STD} -fno-rtti")
+
+IF(NOT DEFINED LIB_INSTALL_DIR)
+       SET(LIB_INSTALL_DIR "${CMAKE_INSTALL_LIBDIR}")
+ENDIF(NOT DEFINED LIB_INSTALL_DIR)
+
+IF(NOT DEFINED INCLUDE_INSTALL_DIR)
+       SET(INCLUDE_INSTALL_DIR "${CMAKE_INSTALL_INCLUDEDIR}")
+ENDIF(NOT DEFINED INCLUDE_INSTALL_DIR)
+
+IF(NOT DEFINED CONF_INSTALL_DIR)
+       SET(CONF_INSTALL_DIR "${SYSCONF_INSTALL_DIR}/dpm")
+ENDIF(NOT DEFINED CONF_INSTALL_DIR)
+
+IF(NOT DEFINED DATA_INSTALL_DIR)
+       SET(DATA_INSTALL_DIR "${CMAKE_INSTALL_PREFIX}/share/dpm")
+ENDIF(NOT DEFINED DATA_INSTALL_DIR)
+
+IF(NOT DEFINED DB_INSTALL_DIR)
+       SET(DB_INSTALL_DIR "${CMAKE_INSTALL_PREFIX}/dbspace")
+ENDIF(NOT DEFINED DB_INSTALL_DIR)
+
+IF(NOT DEFINED RUN_INSTALL_DIR)
+       SET(RUN_INSTALL_DIR "/var/run")
+ENDIF(NOT DEFINED RUN_INSTALL_DIR)
+
+IF(NOT DEFINED PAMD_INSTALL_DIR)
+       SET(PAMD_INSTALL_DIR "${SYSCONF_INSTALL_DIR}/pam.d")
+ENDIF(NOT DEFINED PAMD_INSTALL_DIR)
+
+IF(NOT DEFINED SYSTEMD_UNIT_INSTALL_DIR)
+       SET(SYSTEMD_UNIT_INSTALL_DIR "${CMAKE_INSTALL_PREFIX}/lib/systemd/system")
+ENDIF(NOT DEFINED SYSTEMD_UNIT_INSTALL_DIR)
+
+ADD_DEFINITIONS(-DUG_WAYLAND)
+
+ADD_SUBDIRECTORY(${DPM_PLUGIN})
+ADD_SUBDIRECTORY(${DPM_API})
diff --git a/api/CMakeLists.txt b/api/CMakeLists.txt
new file mode 100755 (executable)
index 0000000..4411af8
--- /dev/null
@@ -0,0 +1,48 @@
+#
+# Copyright (c) 2015 Samsung Electronics Co., Ltd All Rights Reserved
+#
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+#
+SET(TARGET ${PROJECT_NAME})
+SET(PC_FILE "${TARGET}.pc")
+
+SET(LIB_VERSION "${VERSION}")
+SET(LIB_SOVERSION "0")
+
+SET(API_SOURCES "usb.cpp")
+SET(API_HEADERS "usb.h")
+
+SET(DEPENDENCY      klay
+                                       dpm-pil
+                    capi-base-common
+                    capi-system-info
+)
+
+PKG_CHECK_MODULES(API_DEPS REQUIRED ${DEPENDENCY})
+
+SET (CMAKE_SHARED_LINKER_FLAGS "${CMAKE_SHARED_LINKER_FLAGS} -Wl,-z,noexecstack")
+
+ADD_LIBRARY(${TARGET} SHARED ${API_SOURCES})
+
+SET_TARGET_PROPERTIES(${TARGET} PROPERTIES COMPILE_FLAGS "-fvisibility=default")
+SET_TARGET_PROPERTIES(${TARGET} PROPERTIES SOVERSION ${LIB_SOVERSION})
+SET_TARGET_PROPERTIES(${TARGET} PROPERTIES VERSION   ${LIB_VERSION})
+
+INCLUDE_DIRECTORIES(SYSTEM ${API_DEPS_INCLUDE_DIRS})
+TARGET_LINK_LIBRARIES(${TARGET} ${API_DEPS_LIBRARIES} pthread)
+
+CONFIGURE_FILE(${PC_FILE}.in ${CMAKE_BINARY_DIR}/${PC_FILE} @ONLY)
+
+INSTALL(FILES ${CMAKE_BINARY_DIR}/${PC_FILE} DESTINATION ${LIB_INSTALL_DIR}/pkgconfig)
+INSTALL(TARGETS ${TARGET} DESTINATION ${LIB_INSTALL_DIR} COMPONENT RuntimeLibraries)
+INSTALL(FILES ${API_HEADERS} DESTINATION ${INCLUDE_INSTALL_DIR}/dpm)
diff --git a/api/dpm-usb.pc.in b/api/dpm-usb.pc.in
new file mode 100644 (file)
index 0000000..0439db0
--- /dev/null
@@ -0,0 +1,12 @@
+# Package Information for pkg-config
+
+prefix=@CMAKE_INSTALL_PREFIX@
+exec_prefix=@CMAKE_INSTALL_PREFIX@
+libdir=@LIB_INSTALL_DIR@
+includedir=@INCLUDE_INSTALL_DIR@
+
+Name: USB policy module
+Description: USB policy module for device policy manager
+Version: @VERSION@
+Libs: -L${libdir} -ldpm-usb
+Cflags: -I${includedir}/dpm
diff --git a/api/usb.cpp b/api/usb.cpp
new file mode 100644 (file)
index 0000000..1ce48f6
--- /dev/null
@@ -0,0 +1,89 @@
+/*
+ *  Copyright (c) 2016 Samsung Electronics Co., Ltd All Rights Reserved
+ *
+ *  Licensed under the Apache License, Version 2.0 (the "License");
+ *  you may not use this file except in compliance with the License.
+ *  You may obtain a copy of the License at
+ *
+ *      http://www.apache.org/licenses/LICENSE-2.0
+ *
+ *  Unless required by applicable law or agreed to in writing, software
+ *  distributed under the License is distributed on an "AS IS" BASIS,
+ *  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ *  See the License for the specific language governing permissions and
+ *  limitations under the License
+ */
+
+#include <tizen.h>
+#include <tizen_type.h>
+
+#include <dpm/pil/policy-client.h>
+
+#include "usb.h"
+
+EXPORT_API int dpm_usb_set_debugging_state(device_policy_manager_h handle, bool allow)
+{
+       RET_ON_FAILURE(handle, DPM_ERROR_INVALID_PARAMETER);
+
+       DevicePolicyClient &client = GetDevicePolicyClient(handle);
+
+       try {
+               Status<int> status { -1 };
+               status = client.methodCall<int>("Usb::setDebuggingState", allow);
+               return status.get();
+       } catch (...) {
+               return -1;
+       }
+}
+
+EXPORT_API int dpm_usb_get_debugging_state(device_policy_manager_h handle, bool *is_allowed)
+{
+       RET_ON_FAILURE(handle, DPM_ERROR_INVALID_PARAMETER);
+       RET_ON_FAILURE(is_allowed, DPM_ERROR_INVALID_PARAMETER);
+
+       DevicePolicyClient &client = GetDevicePolicyClient(handle);
+
+       try {
+               Status<bool> status { true };
+               status = client.methodCall<bool>("Usb::getDebuggingState");
+               *is_allowed = status.get();
+       } catch (...) {
+               return -1;
+       }
+
+       return DPM_ERROR_NONE;
+}
+
+EXPORT_API int dpm_usb_set_tethering_state(device_policy_manager_h handle, bool allow)
+{
+       RET_ON_FAILURE(handle, DPM_ERROR_INVALID_PARAMETER);
+
+       DevicePolicyClient &client = GetDevicePolicyClient(handle);
+
+       try {
+               Status<int> status { -1 };
+               status = client.methodCall<int>("Usb::setTetheringState", allow);
+               return status.get();
+       } catch (...) {
+               return -1;
+       }
+}
+
+EXPORT_API int dpm_usb_get_tethering_state(device_policy_manager_h handle, bool *is_allowed)
+{
+       RET_ON_FAILURE(handle, DPM_ERROR_INVALID_PARAMETER);
+       RET_ON_FAILURE(is_allowed, DPM_ERROR_INVALID_PARAMETER);
+
+       DevicePolicyClient &client = GetDevicePolicyClient(handle);
+
+       try {
+               Status<bool> status { true };
+               status = client.methodCall<bool>("Usb::getTetheringState");
+               *is_allowed = status.get();
+       } catch (...) {
+               return -1;
+       }
+
+       return DPM_ERROR_NONE;
+}
+
diff --git a/api/usb.h b/api/usb.h
new file mode 100644 (file)
index 0000000..1304392
--- /dev/null
+++ b/api/usb.h
@@ -0,0 +1,129 @@
+/*
+ *  Copyright (c) 2016 Samsung Electronics Co., Ltd All Rights Reserved
+ *
+ *  Licensed under the Apache License, Version 2.0 (the "License");
+ *  you may not use this file except in compliance with the License.
+ *  You may obtain a copy of the License at
+ *
+ *      http://www.apache.org/licenses/LICENSE-2.0
+ *
+ *  Unless required by applicable law or agreed to in writing, software
+ *  distributed under the License is distributed on an "AS IS" BASIS,
+ *  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ *  See the License for the specific language governing permissions and
+ *  limitations under the License
+ */
+
+#ifndef __CAPI_DPM_USB_POLICY_H__
+#define __CAPI_DPM_USB_POLICY_H__
+
+#include <stdbool.h>
+
+typedef void * device_policy_manager_h;
+
+/**
+ * @file usb.h
+ * @brief This file provides APIs to control usb functionality.
+ */
+
+#ifdef __cplusplus
+extern "C" {
+#endif
+
+/**
+ * @addtogroup  CAPI_DPM_USB_POLICY_MODULE
+ * @{
+ */
+
+/**
+ * @partner
+ * @brief       Allows or disallows the usb debugging.
+ * @details     An administrator can use this API to set whether the usb debugging
+ *              is allowed or not.
+ * @since_tizen 3.0
+ * @privlevel   partner
+ * @privilege   %http://tizen.org/privilege/dpm.debugging
+ * @param[in]   handle Device policy manager handle
+ * @param[in]   allow If true, allow the usb debugging, if false, disallow the usb
+ *              debugging
+ * @return      #DPM_ERROR_NONE on success, otherwise a negative value
+ * @retval      #DPM_ERROR_NONE Successful
+ * @retval      #DPM_ERROR_TIMED_OUT Time out
+ * @retval      #DPM_ERROR_INVALID_PARAMETER Invalid parameter
+ * @retval      #DPM_ERROR_PERMISSION_DENIED The application does not have
+ *              the privilege to call this API
+ * @pre         The handle must be created by dpm_manager_create().
+ * @see         dpm_manager_create()
+ * @see         dpm_usb_get_debugging_state()
+ */
+int dpm_usb_set_debugging_state(device_policy_manager_h handle, bool allow);
+
+/**
+ * @brief       Checks whether the usb debugging is allowed or not.
+ * @details     An administrator can use this API to check whether the usb debugging
+ *              is allowed or not.
+ * @since_tizen 3.0
+ * @param[in]   handle Device policy manager handle
+ * @param[out]   is_allowed true if the usb debugging is allowed, false otherwise.
+ * @return      #DPM_ERROR_NONE on success, otherwise a negative value
+ * @retval      #DPM_ERROR_NONE Successful
+ * @retval      #DPM_ERROR_TIMED_OUT Time out
+ * @retval      #DPM_ERROR_INVALID_PARAMETER Invalid parameter
+ * @pre         The handle must be created by dpm_manager_create().
+ * @see         dpm_manager_create()
+ * @see         dpm_usb_set_debugging_state()
+ */
+int dpm_usb_get_debugging_state(device_policy_manager_h handle, bool *is_allowed);
+
+/**
+ * @partner
+ * @brief       Allows or disallows user to change USB tethering settings.
+ * @details     An administrator can use this API to allow or disallow user
+ *              to change USB tethering settings.
+ *              When disallowed, the UI is grayed out so user cannot change the state.
+ * @since_tizen 3.0
+ * @privlevel   partner
+ * @privilege   %http://tizen.org/privilege/dpm.usb
+ * @param[in]   handle Device policy manager handle
+ * @param[in]   allow If true, allow USB tethering state change,
+ *              if false, disallow USB tethering state change.
+ * @return      #DPM_ERROR_NONE on success, otherwise a negative value
+ * @retval      #DPM_ERROR_NONE Successful
+ * @retval      #DPM_ERROR_TIMED_OUT Time out
+ * @retval      #DPM_ERROR_INVALID_PARAMETER Invalid parameter
+ * @retval      #DPM_ERROR_PERMISSION_DENIED The application does not have
+ *              the privilege to call this API
+ * @pre         The handle must be created by dpm_manager_create().
+ * @see         dpm_manager_create()
+ * @see         dpm_usb_get_tethering_state()
+ */
+int dpm_usb_set_tethering_state(device_policy_manager_h handle, bool allow);
+
+/**
+ * @brief       Checks whether the USB tethering state change is allowed.
+ * @details     An administrator can use this API to check whether the USB tethering state change
+ *              is allowed or not.
+ *              If the USB tethering state change is disallowed, the UI is grayed out
+ *              so user can not change its state.
+ * @since_tizen 3.0
+ * @param[in]   handle Device policy manager handle
+ * @param[out]  is_allowed true if the change is allowed, false otherwise.
+ * @return      #DPM_ERROR_NONE on success, otherwise a negative value
+ * @retval      #DPM_ERROR_NONE Successful
+ * @retval      #DPM_ERROR_TIMED_OUT Time out
+ * @retval      #DPM_ERROR_INVALID_PARAMETER Invalid parameter
+ * @pre         The handle must be created by dpm_manager_create().
+ * @see         dpm_manager_create()
+ * @see         dpm_usb_set_tethering_state()
+ */
+int dpm_usb_get_tethering_state(device_policy_manager_h handle, bool *is_allowed);
+
+/**
+ * @}
+ */
+
+#ifdef __cplusplus
+}
+#endif /* __cplusplus */
+
+#endif /* __CAPI_DPM_USB_POLICY_H__ */
diff --git a/dpm-usb.manifest b/dpm-usb.manifest
new file mode 100644 (file)
index 0000000..a76fdba
--- /dev/null
@@ -0,0 +1,5 @@
+<manifest>
+       <request>
+               <domain name="_" />
+       </request>
+</manifest>
diff --git a/packaging/dpm-usb.spec b/packaging/dpm-usb.spec
new file mode 100755 (executable)
index 0000000..f979a20
--- /dev/null
@@ -0,0 +1,76 @@
+Name:    dpm-usb
+Version: 1.0.1
+Release: 0
+License: Apache-2.0
+Source0: %{name}-%{version}.tar.gz
+Summary: Tizen Device Policy Manager USB Policy Module
+Group:   Security/Other
+BuildRequires: gcc
+BuildRequires: cmake
+BuildRequires: gettext-tools
+BuildRequires: pkgconfig(klay)
+BuildRequires: pkgconfig(dpm-pil)
+BuildRequires: pkgconfig(capi-system-info)
+BuildRequires: pkgconfig(capi-base-common)
+
+%description
+The dpm-usb package provides USB policy module for device policy manager
+
+%files
+%manifest dpm-usb.manifest
+%defattr(644,root,root,755)
+%attr(755,root,root) /opt/data/dpm/plugins/usb
+%attr(755,root,root) %{_libdir}/libdpm-usb.so.%{version}
+%{_libdir}/libdpm-usb.so.0
+
+%prep
+%setup -q
+
+%build
+%{!?build_type:%define build_type "RELEASE"}
+
+%if %{build_type} == "DEBUG" || %{build_type} == "PROFILING" || %{build_type} == "CCOV"
+       CFLAGS="$CFLAGS -Wp,-U_FORTIFY_SOURCE"
+       CXXFLAGS="$CXXFLAGS -Wp,-U_FORTIFY_SOURCE"
+%endif
+
+%cmake . -DVERSION=%{version} \
+         -DCMAKE_BUILD_TYPE=%{build_type} \
+         -DSCRIPT_INSTALL_DIR=%{_scriptdir} \
+         -DSYSTEMD_UNIT_INSTALL_DIR=%{_unitdir} \
+         -DDATA_INSTALL_DIR=%{TZ_SYS_DATA}/dpm \
+         -DDB_INSTALL_DIR=%{TZ_SYS_DB} \
+         -DRUN_INSTALL_DIR=%{TZ_SYS_RUN} \
+         -DAPP_INSTALL_PREFIX="%{TZ_SYS_RO_APP}" \
+         -DAPP_SHARE_PACKAGES_DIR="%{TZ_SYS_RO_PACKAGES}" \
+
+make %{?jobs:-j%jobs}
+
+%install
+%make_install
+
+%clean
+rm -rf %{buildroot}
+
+%post
+
+%preun
+
+%postun
+
+## Devel Package ##############################################################
+%package -n libdpm-usb-devel
+Summary: Libraries and header files for device policy client development
+Group: Development/Libraries
+Requires: device-policy-manager = %{version}-%{release}
+
+%description -n libdpm-usb-devel
+The libdpm-usb-devel package includes the libraries and header files necessary for
+developing the DPM client program.
+
+%files -n libdpm-usb-devel
+%manifest dpm-usb.manifest
+%defattr(644,root,root,755)
+%{_libdir}/libdpm-usb.so
+%{_libdir}/pkgconfig/dpm-usb.pc
+%{_includedir}/dpm
diff --git a/plugin/CMakeLists.txt b/plugin/CMakeLists.txt
new file mode 100755 (executable)
index 0000000..728f98c
--- /dev/null
@@ -0,0 +1,33 @@
+#
+# Copyright (c) 2015 Samsung Electronics Co., Ltd All Rights Reserved
+#
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+#
+SET(TARGET "dpm-plugin-usb")
+
+SET(PLUGIN_SOURCES "usb.cpp")
+
+SET(DEPENDENCY      klay
+                                       dpm-pil
+)
+
+PKG_CHECK_MODULES(PLUGIN_DEPS REQUIRED ${DEPENDENCY})
+
+SET (CMAKE_SHARED_LINKER_FLAGS "${CMAKE_SHARED_LINKER_FLAGS} -Wl,-z,noexecstack")
+
+ADD_LIBRARY(${TARGET} SHARED ${PLUGIN_SOURCES})
+SET_TARGET_PROPERTIES(${TARGET} PROPERTIES COMPILE_FLAGS "-fvisibility=default")
+INCLUDE_DIRECTORIES(SYSTEM ${PLUGIN_DEPS_INCLUDE_DIRS})
+TARGET_LINK_LIBRARIES(${TARGET} ${PLUGIN_DEPS_LIBRARIES})
+
+INSTALL(FILES libdpm-plugin-usb.so RENAME usb DESTINATION /opt/data/dpm/plugins)
diff --git a/plugin/usb.cpp b/plugin/usb.cpp
new file mode 100644 (file)
index 0000000..db053ee
--- /dev/null
@@ -0,0 +1,121 @@
+/*
+ *  Copyright (c) 2016 Samsung Electronics Co., Ltd All Rights Reserved
+ *
+ *  Licensed under the Apache License, Version 2.0 (the "License");
+ *  you may not use this file except in compliance with the License.
+ *  You may obtain a copy of the License at
+ *
+ *      http://www.apache.org/licenses/LICENSE-2.0
+ *
+ *  Unless required by applicable law or agreed to in writing, software
+ *  distributed under the License is distributed on an "AS IS" BASIS,
+ *  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ *  See the License for the specific language governing permissions and
+ *  limitations under the License
+ */
+
+#include <iostream>
+
+#include <dpm/pil/policy-context.h>
+#include <dpm/pil/policy-model.h>
+#include <dpm/pil/policy-storage.h>
+#include <dpm/pil/policy-event.h>
+
+class DebuggingMode : public GlobalPolicy<DataSetInt> {
+public:
+       DebuggingMode() : GlobalPolicy("usb-debugging")
+       {
+               PolicyEventNotifier::create("usb-debugging");
+       }
+
+       bool apply(const DataType& value)
+       {
+               int enable = value;
+               PolicyEventNotifier::emit("usb-debugging", enable ? "allowed" : "disallowed");
+               return true;
+       }
+};
+
+class Tethering : public GlobalPolicy<DataSetInt> {
+public:
+       Tethering() : GlobalPolicy("usb-tethering")
+       {
+               PolicyEventNotifier::create("usb-tethering");
+       }
+
+       bool apply(const DataType& value)
+       {
+               int enable = value;
+               PolicyEventNotifier::emit("usb-tethering", enable ? "allowed" : "disallowed");
+               return true;
+       }
+};
+
+class Usb : public AbstractPolicyProvider {
+public:
+       int setDebuggingState(bool enable);
+       bool getDebuggingState();
+
+       int setTetheringState(bool enable);
+       bool getTetheringState();
+
+private:
+       DebuggingMode debugging;
+       Tethering tethering;
+};
+
+
+int Usb::setDebuggingState(bool enable)
+{
+       try {
+               debugging.set(enable);
+       } catch (runtime::Exception& e) {
+               ERROR(e.what());
+               return -1;
+       }
+
+       return 0;
+}
+
+bool Usb::getDebuggingState()
+{
+       return debugging.get();
+}
+
+int Usb::setTetheringState(bool enable)
+{
+       try {
+               tethering.set(enable);
+       } catch (runtime::Exception& e) {
+               ERROR(e.what());
+               return -1;
+       }
+
+       return 0;
+}
+
+bool Usb::getTetheringState()
+{
+       return tethering.get();
+}
+
+
+extern "C" {
+
+#define PRIVILEGE_USB       "http://tizen.org/privilege/dpm.usb"
+#define PRIVILEGE_DEBUGGING "http://tizen.org/privilege/dpm.debugging"
+
+AbstractPolicyProvider *PolicyFactory(PolicyControlContext& context)
+{
+       Usb *policy = new Usb();
+
+       context.expose(policy, PRIVILEGE_DEBUGGING, (int)(Usb::setDebuggingState)(bool));
+       context.expose(policy, PRIVILEGE_USB, (int)(Usb::setTetheringState)(bool));
+
+       context.expose(policy, "", (bool)(Usb::getDebuggingState)());
+       context.expose(policy, "", (bool)(Usb::getTetheringState)());
+
+       return policy;
+}
+
+} // extern "C"