blob: 428bbacfac2fef4f1409567f3f858f8bb29798b7 [file] [log] [blame]
/*
* Copyright (C) 2012 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package com.android.bluetooth;
import static android.Manifest.permission.ACCESS_COARSE_LOCATION;
import static android.Manifest.permission.ACCESS_FINE_LOCATION;
import static android.Manifest.permission.BLUETOOTH_ADVERTISE;
import static android.Manifest.permission.BLUETOOTH_CONNECT;
import static android.Manifest.permission.BLUETOOTH_SCAN;
import static android.Manifest.permission.RENOUNCE_PERMISSIONS;
import static android.content.PermissionChecker.PERMISSION_HARD_DENIED;
import static android.content.PermissionChecker.PID_UNKNOWN;
import static android.content.pm.PackageManager.GET_PERMISSIONS;
import static android.content.pm.PackageManager.PERMISSION_GRANTED;
import static android.os.PowerExemptionManager.TEMPORARY_ALLOW_LIST_TYPE_FOREGROUND_SERVICE_ALLOWED;
import android.Manifest;
import android.annotation.NonNull;
import android.annotation.Nullable;
import android.annotation.RequiresPermission;
import android.annotation.SuppressLint;
import android.app.AppOpsManager;
import android.app.BroadcastOptions;
import android.bluetooth.BluetoothAdapter;
import android.bluetooth.BluetoothDevice;
import android.companion.Association;
import android.companion.CompanionDeviceManager;
import android.content.AttributionSource;
import android.content.ContentValues;
import android.content.Context;
import android.content.PermissionChecker;
import android.content.pm.PackageInfo;
import android.content.pm.PackageManager;
import android.location.LocationManager;
import android.net.Uri;
import android.os.Binder;
import android.os.Build;
import android.os.Bundle;
import android.os.ParcelUuid;
import android.os.PowerExemptionManager;
import android.os.Process;
import android.os.SystemProperties;
import android.os.UserHandle;
import android.os.UserManager;
import android.provider.DeviceConfig;
import android.provider.Telephony;
import android.util.Log;
import com.android.bluetooth.btservice.AdapterService;
import com.android.bluetooth.btservice.ProfileService;
import org.xmlpull.v1.XmlPullParser;
import org.xmlpull.v1.XmlPullParserException;
import java.io.IOException;
import java.io.InputStream;
import java.io.OutputStream;
import java.nio.ByteBuffer;
import java.nio.ByteOrder;
import java.nio.charset.Charset;
import java.nio.charset.CharsetDecoder;
import java.time.Instant;
import java.time.ZoneId;
import java.time.format.DateTimeFormatter;
import java.util.Objects;
import java.util.UUID;
import java.util.concurrent.TimeUnit;
/**
* @hide
*/
public final class Utils {
private static final String TAG = "BluetoothUtils";
private static final int MICROS_PER_UNIT = 625;
private static final String PTS_TEST_MODE_PROPERTY = "persist.bluetooth.pts";
private static final String KEY_TEMP_ALLOW_LIST_DURATION_MS = "temp_allow_list_duration_ms";
private static final long DEFAULT_TEMP_ALLOW_LIST_DURATION_MS = 20_000;
static final int BD_ADDR_LEN = 6; // bytes
static final int BD_UUID_LEN = 16; // bytes
/*
* Special character
*
* (See "What is a phone number?" doc)
* 'p' --- GSM pause character, same as comma
* 'n' --- GSM wild character
* 'w' --- GSM wait character
*/
public static final char PAUSE = ',';
public static final char WAIT = ';';
private static boolean isPause(char c) {
return c == 'p' || c == 'P';
}
private static boolean isToneWait(char c) {
return c == 'w' || c == 'W';
}
public static @Nullable String getName(@Nullable BluetoothDevice device) {
final AdapterService service = AdapterService.getAdapterService();
if (service != null && device != null) {
return service.getRemoteName(device);
} else {
return null;
}
}
public static String getAddressStringFromByte(byte[] address) {
if (address == null || address.length != BD_ADDR_LEN) {
return null;
}
return String.format("%02X:%02X:%02X:%02X:%02X:%02X", address[0], address[1], address[2],
address[3], address[4], address[5]);
}
public static byte[] getByteAddress(BluetoothDevice device) {
return getBytesFromAddress(device.getAddress());
}
public static byte[] addressToBytes(String address) {
return getBytesFromAddress(address);
}
public static byte[] getBytesFromAddress(String address) {
int i, j = 0;
byte[] output = new byte[BD_ADDR_LEN];
for (i = 0; i < address.length(); i++) {
if (address.charAt(i) != ':') {
output[j] = (byte) Integer.parseInt(address.substring(i, i + 2), BD_UUID_LEN);
j++;
i++;
}
}
return output;
}
public static int byteArrayToInt(byte[] valueBuf) {
return byteArrayToInt(valueBuf, 0);
}
public static short byteArrayToShort(byte[] valueBuf) {
ByteBuffer converter = ByteBuffer.wrap(valueBuf);
converter.order(ByteOrder.nativeOrder());
return converter.getShort();
}
public static int byteArrayToInt(byte[] valueBuf, int offset) {
ByteBuffer converter = ByteBuffer.wrap(valueBuf);
converter.order(ByteOrder.nativeOrder());
return converter.getInt(offset);
}
public static String byteArrayToString(byte[] valueBuf) {
StringBuilder sb = new StringBuilder();
for (int idx = 0; idx < valueBuf.length; idx++) {
if (idx != 0) {
sb.append(" ");
}
sb.append(String.format("%02x", valueBuf[idx]));
}
return sb.toString();
}
/**
* A parser to transfer a byte array to a UTF8 string
*
* @param valueBuf the byte array to transfer
* @return the transferred UTF8 string
*/
public static String byteArrayToUtf8String(byte[] valueBuf) {
CharsetDecoder decoder = Charset.forName("UTF8").newDecoder();
ByteBuffer byteBuffer = ByteBuffer.wrap(valueBuf);
String valueStr = "";
try {
valueStr = decoder.decode(byteBuffer).toString();
} catch (Exception ex) {
Log.e(TAG, "Error when parsing byte array to UTF8 String. " + ex);
}
return valueStr;
}
public static byte[] intToByteArray(int value) {
ByteBuffer converter = ByteBuffer.allocate(4);
converter.order(ByteOrder.nativeOrder());
converter.putInt(value);
return converter.array();
}
public static byte[] uuidToByteArray(ParcelUuid pUuid) {
int length = BD_UUID_LEN;
ByteBuffer converter = ByteBuffer.allocate(length);
converter.order(ByteOrder.BIG_ENDIAN);
long msb, lsb;
UUID uuid = pUuid.getUuid();
msb = uuid.getMostSignificantBits();
lsb = uuid.getLeastSignificantBits();
converter.putLong(msb);
converter.putLong(8, lsb);
return converter.array();
}
public static byte[] uuidsToByteArray(ParcelUuid[] uuids) {
int length = uuids.length * BD_UUID_LEN;
ByteBuffer converter = ByteBuffer.allocate(length);
converter.order(ByteOrder.BIG_ENDIAN);
UUID uuid;
long msb, lsb;
for (int i = 0; i < uuids.length; i++) {
uuid = uuids[i].getUuid();
msb = uuid.getMostSignificantBits();
lsb = uuid.getLeastSignificantBits();
converter.putLong(i * BD_UUID_LEN, msb);
converter.putLong(i * BD_UUID_LEN + 8, lsb);
}
return converter.array();
}
public static ParcelUuid[] byteArrayToUuid(byte[] val) {
int numUuids = val.length / BD_UUID_LEN;
ParcelUuid[] puuids = new ParcelUuid[numUuids];
UUID uuid;
int offset = 0;
ByteBuffer converter = ByteBuffer.wrap(val);
converter.order(ByteOrder.BIG_ENDIAN);
for (int i = 0; i < numUuids; i++) {
puuids[i] = new ParcelUuid(
new UUID(converter.getLong(offset), converter.getLong(offset + 8)));
offset += BD_UUID_LEN;
}
return puuids;
}
public static String debugGetAdapterStateString(int state) {
switch (state) {
case BluetoothAdapter.STATE_OFF:
return "STATE_OFF";
case BluetoothAdapter.STATE_ON:
return "STATE_ON";
case BluetoothAdapter.STATE_TURNING_ON:
return "STATE_TURNING_ON";
case BluetoothAdapter.STATE_TURNING_OFF:
return "STATE_TURNING_OFF";
default:
return "UNKNOWN";
}
}
public static String ellipsize(String s) {
// Only ellipsize release builds
if (!Build.TYPE.equals("user")) {
return s;
}
if (s == null) {
return null;
}
if (s.length() < 3) {
return s;
}
return s.charAt(0) + "⋯" + s.charAt(s.length() - 1);
}
public static void copyStream(InputStream is, OutputStream os, int bufferSize)
throws IOException {
if (is != null && os != null) {
byte[] buffer = new byte[bufferSize];
int bytesRead = 0;
while ((bytesRead = is.read(buffer)) >= 0) {
os.write(buffer, 0, bytesRead);
}
}
}
public static void safeCloseStream(InputStream is) {
if (is != null) {
try {
is.close();
} catch (Throwable t) {
Log.d(TAG, "Error closing stream", t);
}
}
}
public static void safeCloseStream(OutputStream os) {
if (os != null) {
try {
os.close();
} catch (Throwable t) {
Log.d(TAG, "Error closing stream", t);
}
}
}
static int sSystemUiUid = UserHandle.USER_NULL;
public static void setSystemUiUid(int uid) {
Utils.sSystemUiUid = uid;
}
static int sForegroundUserId = UserHandle.USER_NULL;
public static void setForegroundUserId(int uid) {
Utils.sForegroundUserId = uid;
}
/**
* Enforces that a Companion Device Manager (CDM) association exists between the calling
* application and the Bluetooth Device.
*
* @param cdm the CompanionDeviceManager object
* @param context the Bluetooth AdapterService context
* @param callingPackage the calling package
* @param callingUid the calling app uid
* @param device the remote BluetoothDevice
* @return {@code true} if there is a CDM association
* @throws SecurityException if the package name does not match the uid or the association
* doesn't exist
*/
public static boolean enforceCdmAssociation(CompanionDeviceManager cdm, Context context,
String callingPackage, int callingUid, BluetoothDevice device) {
if (!isPackageNameAccurate(context, callingPackage, callingUid)) {
throw new SecurityException("hasCdmAssociation: Package name " + callingPackage
+ " is inaccurate for calling uid " + callingUid);
}
for (Association association : cdm.getAllAssociations()) {
if (association.getPackageName().equals(callingPackage)
&& association.getDeviceMacAddress().equals(device.getAddress())) {
return true;
}
}
throw new SecurityException("The application with package name " + callingPackage
+ " does not have a CDM association with the Bluetooth Device");
}
/**
* Verifies whether the calling package name matches the calling app uid
* @param context the Bluetooth AdapterService context
* @param callingPackage the calling application package name
* @param callingUid the calling application uid
* @return {@code true} if the package name matches the calling app uid, {@code false} otherwise
*/
public static boolean isPackageNameAccurate(Context context, String callingPackage,
int callingUid) {
// Verifies the integrity of the calling package name
try {
int packageUid = context.getPackageManager().getPackageUid(callingPackage, 0);
if (packageUid != callingUid) {
Log.e(TAG, "isPackageNameAccurate: App with package name " + callingPackage
+ " is UID " + packageUid + " but caller is " + callingUid);
return false;
}
} catch (PackageManager.NameNotFoundException e) {
Log.e(TAG, "isPackageNameAccurate: App with package name " + callingPackage
+ " does not exist");
return false;
}
return true;
}
/**
* Checks whether the caller has the BLUETOOTH_PRIVILEGED permission
*
* @param context the Bluetooth AdapterService context
* @return {@code true} if the caller has the BLUETOOTH_PRIVILEGED permission, {@code false}
* otherwise
*/
// Suppressed since we're not actually enforcing here
@SuppressLint("AndroidFrameworkRequiresPermission")
public static boolean hasBluetoothPrivilegedPermission(Context context) {
return context.checkCallingOrSelfPermission(Manifest.permission.BLUETOOTH_PRIVILEGED)
== PackageManager.PERMISSION_GRANTED;
}
@RequiresPermission(android.Manifest.permission.BLUETOOTH_PRIVILEGED)
public static void enforceBluetoothPrivilegedPermission(Context context) {
context.enforceCallingOrSelfPermission(
android.Manifest.permission.BLUETOOTH_PRIVILEGED,
"Need BLUETOOTH PRIVILEGED permission");
}
@RequiresPermission(android.Manifest.permission.LOCAL_MAC_ADDRESS)
public static void enforceLocalMacAddressPermission(Context context) {
context.enforceCallingOrSelfPermission(
android.Manifest.permission.LOCAL_MAC_ADDRESS,
"Need LOCAL_MAC_ADDRESS permission");
}
@RequiresPermission(android.Manifest.permission.DUMP)
public static void enforceDumpPermission(Context context) {
context.enforceCallingOrSelfPermission(
android.Manifest.permission.DUMP,
"Need DUMP permission");
}
/**
*/
public static AttributionSource getCallingAttributionSource(Context context) {
int callingUid = Binder.getCallingUid();
if (callingUid == android.os.Process.ROOT_UID) {
callingUid = android.os.Process.SYSTEM_UID;
}
return new AttributionSource.Builder(callingUid)
.setPackageName(context.getPackageManager().getPackagesForUid(callingUid)[0])
.build();
}
@SuppressLint("AndroidFrameworkRequiresPermission")
private static boolean checkPermissionForPreflight(Context context, String permission) {
final int result = PermissionChecker.checkCallingOrSelfPermissionForPreflight(
context, permission);
if (result == PERMISSION_GRANTED) {
return true;
}
final String msg = "Need " + permission + " permission";
if (result == PERMISSION_HARD_DENIED) {
throw new SecurityException(msg);
} else {
Log.w(TAG, msg);
return false;
}
}
@SuppressLint("AndroidFrameworkRequiresPermission")
private static boolean checkPermissionForDataDelivery(Context context, String permission,
AttributionSource attributionSource, String message) {
// STOPSHIP(b/188391719): enable this security enforcement
// attributionSource.enforceCallingUid();
AttributionSource currentAttribution = new AttributionSource
.Builder(context.getAttributionSource())
.setNext(attributionSource)
.build();
final int result = PermissionChecker.checkPermissionForDataDeliveryFromDataSource(
context, permission, PID_UNKNOWN, currentAttribution, message);
if (result == PERMISSION_GRANTED) {
return true;
}
final String msg = "Need " + permission + " permission for " + attributionSource + ": "
+ message;
if (result == PERMISSION_HARD_DENIED) {
throw new SecurityException(msg);
} else {
Log.w(TAG, msg);
return false;
}
}
/**
* Returns true if the BLUETOOTH_CONNECT permission is granted for the calling app. Returns
* false if the result is a soft denial. Throws SecurityException if the result is a hard
* denial.
*
* <p>Should be used in situations where the app op should not be noted.
*/
@SuppressLint("AndroidFrameworkRequiresPermission")
@RequiresPermission(android.Manifest.permission.BLUETOOTH_CONNECT)
public static boolean checkConnectPermissionForPreflight(Context context) {
return checkPermissionForPreflight(context, BLUETOOTH_CONNECT);
}
/**
* Returns true if the BLUETOOTH_CONNECT permission is granted for the calling app. Returns
* false if the result is a soft denial. Throws SecurityException if the result is a hard
* denial.
*
* <p>Should be used in situations where data will be delivered and hence the app op should
* be noted.
*/
@SuppressLint("AndroidFrameworkRequiresPermission")
@RequiresPermission(android.Manifest.permission.BLUETOOTH_CONNECT)
public static boolean checkConnectPermissionForDataDelivery(
Context context, AttributionSource attributionSource, String message) {
return checkPermissionForDataDelivery(context, BLUETOOTH_CONNECT,
attributionSource, message);
}
/**
* Returns true if the BLUETOOTH_SCAN permission is granted for the calling app. Returns false
* if the result is a soft denial. Throws SecurityException if the result is a hard denial.
*
* <p>Should be used in situations where the app op should not be noted.
*/
@SuppressLint("AndroidFrameworkRequiresPermission")
@RequiresPermission(android.Manifest.permission.BLUETOOTH_SCAN)
public static boolean checkScanPermissionForPreflight(Context context) {
return checkPermissionForPreflight(context, BLUETOOTH_SCAN);
}
/**
* Returns true if the BLUETOOTH_SCAN permission is granted for the calling app. Returns false
* if the result is a soft denial. Throws SecurityException if the result is a hard denial.
*
* <p>Should be used in situations where data will be delivered and hence the app op should
* be noted.
*/
@SuppressLint("AndroidFrameworkRequiresPermission")
@RequiresPermission(android.Manifest.permission.BLUETOOTH_SCAN)
public static boolean checkScanPermissionForDataDelivery(
Context context, AttributionSource attributionSource, String message) {
return checkPermissionForDataDelivery(context, BLUETOOTH_SCAN,
attributionSource, message);
}
/**
* Returns true if the BLUETOOTH_ADVERTISE permission is granted for the
* calling app. Returns false if the result is a soft denial. Throws
* SecurityException if the result is a hard denial.
* <p>
* Should be used in situations where the app op should not be noted.
*/
@SuppressLint("AndroidFrameworkRequiresPermission")
@RequiresPermission(android.Manifest.permission.BLUETOOTH_ADVERTISE)
public static boolean checkAdvertisePermissionForPreflight(Context context) {
return checkPermissionForPreflight(context, BLUETOOTH_ADVERTISE);
}
/**
* Returns true if the BLUETOOTH_ADVERTISE permission is granted for the
* calling app. Returns false if the result is a soft denial. Throws
* SecurityException if the result is a hard denial.
* <p>
* Should be used in situations where data will be delivered and hence the
* app op should be noted.
*/
@SuppressLint("AndroidFrameworkRequiresPermission")
@RequiresPermission(android.Manifest.permission.BLUETOOTH_ADVERTISE)
public static boolean checkAdvertisePermissionForDataDelivery(
Context context, AttributionSource attributionSource, String message) {
return checkPermissionForDataDelivery(context, BLUETOOTH_ADVERTISE,
attributionSource, message);
}
/**
* Returns true if the specified package has disavowed the use of bluetooth scans for location,
* that is, if they have specified the {@code neverForLocation} flag on the BLUETOOTH_SCAN
* permission.
*/
// Suppressed since we're not actually enforcing here
@SuppressLint("AndroidFrameworkRequiresPermission")
public static boolean hasDisavowedLocationForScan(
Context context, AttributionSource attributionSource, boolean inTestMode) {
// Check every step along the attribution chain for a renouncement.
// If location has been renounced anywhere in the chain we treat it as a disavowal.
AttributionSource currentAttrib = attributionSource;
while (true) {
if (currentAttrib.getRenouncedPermissions().contains(ACCESS_FINE_LOCATION)
&& (inTestMode || context.checkPermission(RENOUNCE_PERMISSIONS, -1,
currentAttrib.getUid())
== PackageManager.PERMISSION_GRANTED)) {
return true;
}
AttributionSource nextAttrib = currentAttrib.getNext();
if (nextAttrib == null) {
break;
}
currentAttrib = nextAttrib;
}
// Check the last attribution in the chain for a neverForLocation disavowal.
String packageName = currentAttrib.getPackageName();
PackageManager pm = context.getPackageManager();
try {
// TODO(b/183478032): Cache PackageInfo for use here.
PackageInfo pkgInfo = pm.getPackageInfo(packageName, GET_PERMISSIONS);
for (int i = 0; i < pkgInfo.requestedPermissions.length; i++) {
if (pkgInfo.requestedPermissions[i].equals(BLUETOOTH_SCAN)) {
return (pkgInfo.requestedPermissionsFlags[i]
& PackageInfo.REQUESTED_PERMISSION_NEVER_FOR_LOCATION) != 0;
}
}
} catch (PackageManager.NameNotFoundException e) {
Log.w(TAG, "Could not find package for disavowal check: " + packageName);
}
return false;
}
public static boolean checkCallerIsSystemOrActiveUser() {
int callingUid = Binder.getCallingUid();
UserHandle callingUser = UserHandle.getUserHandleForUid(callingUid);
return (sForegroundUserId == callingUser.getIdentifier())
|| (UserHandle.getAppId(sSystemUiUid) == UserHandle.getAppId(callingUid))
|| (UserHandle.getAppId(Process.SYSTEM_UID) == UserHandle.getAppId(callingUid));
}
public static boolean checkCallerIsSystemOrActiveUser(String tag) {
final boolean res = checkCallerIsSystemOrActiveUser();
if (!res) {
Log.w(TAG, tag + " - Not allowed for non-active user and non-system user");
}
return res;
}
public static boolean callerIsSystemOrActiveUser(String tag, String method) {
return checkCallerIsSystemOrActiveUser(tag + "." + method + "()");
}
public static boolean checkCallerIsSystemOrActiveOrManagedUser(Context context) {
if (context == null) {
return checkCallerIsSystemOrActiveUser();
}
int callingUid = Binder.getCallingUid();
UserHandle callingUser = UserHandle.getUserHandleForUid(callingUid);
// Use the Bluetooth process identity when making call to get parent user
final long ident = Binder.clearCallingIdentity();
try {
UserManager um = context.getSystemService(UserManager.class);
UserHandle uh = um.getProfileParent(callingUser);
int parentUser = (uh != null) ? uh.getIdentifier() : UserHandle.USER_NULL;
// Always allow SystemUI/System access.
return (sForegroundUserId == callingUser.getIdentifier())
|| (sForegroundUserId == parentUser)
|| (UserHandle.getAppId(sSystemUiUid) == UserHandle.getAppId(callingUid))
|| (UserHandle.getAppId(Process.SYSTEM_UID) == UserHandle.getAppId(callingUid));
} catch (Exception ex) {
Log.e(TAG, "checkCallerAllowManagedProfiles: Exception ex=" + ex);
return false;
} finally {
Binder.restoreCallingIdentity(ident);
}
}
public static boolean checkCallerIsSystemOrActiveOrManagedUser(Context context, String tag) {
final boolean res = checkCallerIsSystemOrActiveOrManagedUser(context);
if (!res) {
Log.w(TAG, tag + " - Not allowed for"
+ " non-active user and non-system and non-managed user");
}
return res;
}
public static boolean callerIsSystemOrActiveOrManagedUser(Context context, String tag,
String method) {
return checkCallerIsSystemOrActiveOrManagedUser(context, tag + "." + method + "()");
}
public static boolean checkServiceAvailable(ProfileService service, String tag) {
if (service == null) {
Log.w(TAG, tag + " - Not present");
return false;
}
if (!service.isAvailable()) {
Log.w(TAG, tag + " - Not available");
return false;
}
return true;
}
/**
* Checks whether location is off and must be on for us to perform some operation
*/
public static boolean blockedByLocationOff(Context context, UserHandle userHandle) {
return !context.getSystemService(LocationManager.class)
.isLocationEnabledForUser(userHandle);
}
/**
* Checks that calling process has android.Manifest.permission.ACCESS_COARSE_LOCATION and
* OP_COARSE_LOCATION is allowed
*/
// Suppressed since we're not actually enforcing here
@SuppressLint("AndroidFrameworkRequiresPermission")
public static boolean checkCallerHasCoarseLocation(
Context context, AttributionSource attributionSource, UserHandle userHandle) {
if (blockedByLocationOff(context, userHandle)) {
Log.e(TAG, "Permission denial: Location is off.");
return false;
}
AttributionSource currentAttribution = new AttributionSource
.Builder(context.getAttributionSource())
.setNext(attributionSource)
.build();
// STOPSHIP(b/188391719): enable this security enforcement
// attributionSource.enforceCallingUid();
if (PermissionChecker.checkPermissionForDataDeliveryFromDataSource(
context, ACCESS_COARSE_LOCATION, PID_UNKNOWN, currentAttribution,
"Bluetooth location check") == PERMISSION_GRANTED) {
return true;
}
Log.e(TAG, "Permission denial: Need ACCESS_COARSE_LOCATION "
+ "permission to get scan results");
return false;
}
/**
* Checks that calling process has android.Manifest.permission.ACCESS_COARSE_LOCATION and
* OP_COARSE_LOCATION is allowed or android.Manifest.permission.ACCESS_FINE_LOCATION and
* OP_FINE_LOCATION is allowed
*/
// Suppressed since we're not actually enforcing here
@SuppressLint("AndroidFrameworkRequiresPermission")
public static boolean checkCallerHasCoarseOrFineLocation(
Context context, AttributionSource attributionSource, UserHandle userHandle) {
if (blockedByLocationOff(context, userHandle)) {
Log.e(TAG, "Permission denial: Location is off.");
return false;
}
final AttributionSource currentAttribution = new AttributionSource
.Builder(context.getAttributionSource())
.setNext(attributionSource)
.build();
// STOPSHIP(b/188391719): enable this security enforcement
// attributionSource.enforceCallingUid();
if (PermissionChecker.checkPermissionForDataDeliveryFromDataSource(
context, ACCESS_FINE_LOCATION, PID_UNKNOWN, currentAttribution,
"Bluetooth location check") == PERMISSION_GRANTED) {
return true;
}
if (PermissionChecker.checkPermissionForDataDeliveryFromDataSource(
context, ACCESS_COARSE_LOCATION, PID_UNKNOWN, currentAttribution,
"Bluetooth location check") == PERMISSION_GRANTED) {
return true;
}
Log.e(TAG, "Permission denial: Need ACCESS_COARSE_LOCATION or ACCESS_FINE_LOCATION"
+ "permission to get scan results");
return false;
}
/**
* Checks that calling process has android.Manifest.permission.ACCESS_FINE_LOCATION and
* OP_FINE_LOCATION is allowed
*/
// Suppressed since we're not actually enforcing here
@SuppressLint("AndroidFrameworkRequiresPermission")
public static boolean checkCallerHasFineLocation(
Context context, AttributionSource attributionSource, UserHandle userHandle) {
if (blockedByLocationOff(context, userHandle)) {
Log.e(TAG, "Permission denial: Location is off.");
return false;
}
AttributionSource currentAttribution = new AttributionSource
.Builder(context.getAttributionSource())
.setNext(attributionSource)
.build();
// STOPSHIP(b/188391719): enable this security enforcement
// attributionSource.enforceCallingUid();
if (PermissionChecker.checkPermissionForDataDeliveryFromDataSource(
context, ACCESS_FINE_LOCATION, PID_UNKNOWN, currentAttribution,
"Bluetooth location check") == PERMISSION_GRANTED) {
return true;
}
Log.e(TAG, "Permission denial: Need ACCESS_FINE_LOCATION "
+ "permission to get scan results");
return false;
}
/**
* Returns true if the caller holds NETWORK_SETTINGS
*/
// Suppressed since we're not actually enforcing here
@SuppressLint("AndroidFrameworkRequiresPermission")
public static boolean checkCallerHasNetworkSettingsPermission(Context context) {
return context.checkCallingOrSelfPermission(android.Manifest.permission.NETWORK_SETTINGS)
== PackageManager.PERMISSION_GRANTED;
}
/**
* Returns true if the caller holds NETWORK_SETUP_WIZARD
*/
// Suppressed since we're not actually enforcing here
@SuppressLint("AndroidFrameworkRequiresPermission")
public static boolean checkCallerHasNetworkSetupWizardPermission(Context context) {
return context.checkCallingOrSelfPermission(
android.Manifest.permission.NETWORK_SETUP_WIZARD)
== PackageManager.PERMISSION_GRANTED;
}
/**
* Returns true if the caller holds RADIO_SCAN_WITHOUT_LOCATION
*/
// Suppressed since we're not actually enforcing here
@SuppressLint("AndroidFrameworkRequiresPermission")
public static boolean checkCallerHasScanWithoutLocationPermission(Context context) {
return context.checkCallingOrSelfPermission(
android.Manifest.permission.RADIO_SCAN_WITHOUT_LOCATION)
== PackageManager.PERMISSION_GRANTED;
}
// Suppressed since we're not actually enforcing here
@SuppressLint("AndroidFrameworkRequiresPermission")
public static boolean checkCallerHasPrivilegedPermission(Context context) {
return context.checkCallingOrSelfPermission(
android.Manifest.permission.BLUETOOTH_PRIVILEGED)
== PackageManager.PERMISSION_GRANTED;
}
// Suppressed since we're not actually enforcing here
@SuppressLint("AndroidFrameworkRequiresPermission")
public static boolean checkCallerHasWriteSmsPermission(Context context) {
return context.checkCallingOrSelfPermission(
android.Manifest.permission.WRITE_SMS) == PackageManager.PERMISSION_GRANTED;
}
public static boolean isQApp(Context context, String pkgName) {
try {
return context.getPackageManager().getApplicationInfo(pkgName, 0).targetSdkVersion
>= Build.VERSION_CODES.Q;
} catch (PackageManager.NameNotFoundException e) {
// In case of exception, assume Q app
}
return true;
}
private static boolean isAppOppAllowed(AppOpsManager appOps, String op, String callingPackage,
@NonNull String callingFeatureId) {
return appOps.noteOp(op, Binder.getCallingUid(), callingPackage, callingFeatureId, null)
== AppOpsManager.MODE_ALLOWED;
}
/**
* Converts {@code millisecond} to unit. Each unit is 0.625 millisecond.
*/
public static int millsToUnit(int milliseconds) {
return (int) (TimeUnit.MILLISECONDS.toMicros(milliseconds) / MICROS_PER_UNIT);
}
/**
* Check if we are running in BluetoothInstrumentationTest context by trying to load
* com.android.bluetooth.FileSystemWriteTest. If we are not in Instrumentation test mode, this
* class should not be found. Thus, the assumption is that FileSystemWriteTest must exist.
* If FileSystemWriteTest is removed in the future, another test class in
* BluetoothInstrumentationTest should be used instead
*
* @return true if in BluetoothInstrumentationTest, false otherwise
*/
public static boolean isInstrumentationTestMode() {
try {
return Class.forName("com.android.bluetooth.FileSystemWriteTest") != null;
} catch (ClassNotFoundException exception) {
return false;
}
}
/**
* Throws {@link IllegalStateException} if we are not in BluetoothInstrumentationTest. Useful
* for ensuring certain methods only get called in BluetoothInstrumentationTest
*/
public static void enforceInstrumentationTestMode() {
if (!isInstrumentationTestMode()) {
throw new IllegalStateException("Not in BluetoothInstrumentationTest");
}
}
/**
* Check if we are running in PTS test mode. To enable/disable PTS test mode, invoke
* {@code adb shell setprop persist.bluetooth.pts true/false}
*
* @return true if in PTS Test mode, false otherwise
*/
public static boolean isPtsTestMode() {
return SystemProperties.getBoolean(PTS_TEST_MODE_PROPERTY, false);
}
/**
* Get uid/pid string in a binder call
*
* @return "uid/pid=xxxx/yyyy"
*/
public static String getUidPidString() {
return "uid/pid=" + Binder.getCallingUid() + "/" + Binder.getCallingPid();
}
/**
* Get system local time
*
* @return "MM-dd HH:mm:ss.SSS"
*/
public static String getLocalTimeString() {
return DateTimeFormatter.ofPattern("MM-dd HH:mm:ss.SSS")
.withZone(ZoneId.systemDefault()).format(Instant.now());
}
public static void skipCurrentTag(XmlPullParser parser)
throws XmlPullParserException, IOException {
int outerDepth = parser.getDepth();
int type;
while ((type = parser.next()) != XmlPullParser.END_DOCUMENT
&& (type != XmlPullParser.END_TAG
|| parser.getDepth() > outerDepth)) {
}
}
/**
* Converts pause and tonewait pause characters
* to Android representation.
* RFC 3601 says pause is 'p' and tonewait is 'w'.
*/
public static String convertPreDial(String phoneNumber) {
if (phoneNumber == null) {
return null;
}
int len = phoneNumber.length();
StringBuilder ret = new StringBuilder(len);
for (int i = 0; i < len; i++) {
char c = phoneNumber.charAt(i);
if (isPause(c)) {
c = PAUSE;
} else if (isToneWait(c)) {
c = WAIT;
}
ret.append(c);
}
return ret.toString();
}
/**
* Move a message to the given folder.
*
* @param context the context to use
* @param uri the message to move
* @param messageSent if the message is SENT or FAILED
* @return true if the operation succeeded
*/
public static boolean moveMessageToFolder(Context context, Uri uri, boolean messageSent) {
if (uri == null) {
return false;
}
ContentValues values = new ContentValues(3);
if (messageSent) {
values.put(Telephony.Sms.READ, 1);
values.put(Telephony.Sms.TYPE, Telephony.Sms.MESSAGE_TYPE_SENT);
} else {
values.put(Telephony.Sms.READ, 0);
values.put(Telephony.Sms.TYPE, Telephony.Sms.MESSAGE_TYPE_FAILED);
}
values.put(Telephony.Sms.ERROR_CODE, 0);
return 1 == context.getContentResolver().update(uri, values, null, null);
}
public static @NonNull Bundle getTempAllowlistBroadcastOptions() {
// Use the Bluetooth process identity to pass permission check when reading DeviceConfig
final long ident = Binder.clearCallingIdentity();
final BroadcastOptions bOptions = BroadcastOptions.makeBasic();
try {
final long durationMs = DeviceConfig.getLong(DeviceConfig.NAMESPACE_BLUETOOTH,
KEY_TEMP_ALLOW_LIST_DURATION_MS, DEFAULT_TEMP_ALLOW_LIST_DURATION_MS);
bOptions.setTemporaryAppAllowlist(durationMs,
TEMPORARY_ALLOW_LIST_TYPE_FOREGROUND_SERVICE_ALLOWED,
PowerExemptionManager.REASON_BLUETOOTH_BROADCAST, "");
} finally {
Binder.restoreCallingIdentity(ident);
}
return bOptions.toBundle();
}
/**
* Checks that value is present as at least one of the elements of the array.
* @param array the array to check in
* @param value the value to check for
* @return true if the value is present in the array
*/
public static <T> boolean arrayContains(@Nullable T[] array, T value) {
if (array == null) return false;
for (T element : array) {
if (Objects.equals(element, value)) return true;
}
return false;
}
}