Merge changes from topic "gralloc-mapper-cleanup"
* changes:
graphics: move libVtsHalGraphicsMapperTestUtils
graphics: make mapper default impl a header library
graphics: add mapper HAL support library
graphics: make allocator passthrough library header-only
diff --git a/compatibility_matrices/compatibility_matrix.current.xml b/compatibility_matrices/compatibility_matrix.current.xml
index 5296142..5aecea0 100644
--- a/compatibility_matrices/compatibility_matrix.current.xml
+++ b/compatibility_matrices/compatibility_matrix.current.xml
@@ -248,6 +248,14 @@
</interface>
</hal>
<hal format="hidl" optional="true">
+ <name>android.hardware.secure_element</name>
+ <version>1.0</version>
+ <interface>
+ <name>ISecureElement</name>
+ <instance>eSE1</instance>
+ </interface>
+ </hal>
+ <hal format="hidl" optional="true">
<name>android.hardware.sensors</name>
<version>1.0</version>
<interface>
diff --git a/nfc/1.1/Android.bp b/nfc/1.1/Android.bp
new file mode 100644
index 0000000..73dc70a
--- /dev/null
+++ b/nfc/1.1/Android.bp
@@ -0,0 +1,23 @@
+// This file is autogenerated by hidl-gen -Landroidbp.
+
+hidl_interface {
+ name: "android.hardware.nfc@1.1",
+ root: "android.hardware",
+ vndk: {
+ enabled: true,
+ },
+ srcs: [
+ "types.hal",
+ "INfc.hal",
+ "INfcClientCallback.hal",
+ ],
+ interfaces: [
+ "android.hardware.nfc@1.0",
+ "android.hidl.base@1.0",
+ ],
+ types: [
+ "NfcEvent",
+ ],
+ gen_java: true,
+}
+
diff --git a/nfc/1.1/INfc.hal b/nfc/1.1/INfc.hal
new file mode 100644
index 0000000..ea6a571
--- /dev/null
+++ b/nfc/1.1/INfc.hal
@@ -0,0 +1,52 @@
+/*
+ * Copyright (C) 2017 The Android Open Source Project
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package android.hardware.nfc@1.1;
+
+import @1.1::INfcClientCallback;
+import @1.0::INfc;
+import @1.0::NfcStatus;
+
+interface INfc extends @1.0::INfc {
+ /**
+ * Clears the NFC chip.
+ *
+ * Must be called during factory reset and/or before the first time the HAL is
+ * initialized after a factory reset
+ */
+ factoryReset();
+
+ /**
+ * Enable Power off use cases and close the NFC controller.
+ * Should free all resources.
+ *
+ * This call must enable NFC functionality for off host usecases in power
+ * off use cases, if the device supports power off use cases. If the
+ * device doesn't support power off use cases, this call should be same as
+ * close()
+ *
+ * @return NfcStatus::OK on success and NfcStatus::FAILED on error.
+ */
+ closeForPowerOffCase() generates (NfcStatus status);
+
+ /**
+ * Open call to take the @1.1::INfcClientCallback
+ *
+ * @param clientCallback for sending events and data to client.
+ * @return status NfcStatus::FAILED in case of error,
+ * NfcStatus::SUCCESS otherwise.
+ */
+ open_1_1(INfcClientCallback clientCallback) generates (NfcStatus status);
+};
diff --git a/nfc/1.1/INfcClientCallback.hal b/nfc/1.1/INfcClientCallback.hal
new file mode 100644
index 0000000..8e1a7bc
--- /dev/null
+++ b/nfc/1.1/INfcClientCallback.hal
@@ -0,0 +1,28 @@
+/*
+ * Copyright (C) 2018 The Android Open Source Project
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+package android.hardware.nfc@1.1;
+
+import @1.0::INfcClientCallback;
+import @1.0::NfcStatus;
+
+interface INfcClientCallback extends @1.0::INfcClientCallback {
+ /**
+ * The callback passed in from the NFC stack that the HAL
+ * can use to pass events back to the stack.
+ */
+ sendEvent_1_1(NfcEvent event, NfcStatus status);
+};
diff --git a/nfc/1.1/types.hal b/nfc/1.1/types.hal
new file mode 100644
index 0000000..2f5ec7f
--- /dev/null
+++ b/nfc/1.1/types.hal
@@ -0,0 +1,23 @@
+/*
+ * Copyright (C) 2017 The Android Open Source Project
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package android.hardware.nfc@1.1;
+
+import @1.0::NfcEvent;
+
+enum NfcEvent : @1.0::NfcEvent {
+ /** In case of an error, HCI network needs to be re-initialized */
+ HCI_NETWORK_RESET = 7
+};
diff --git a/secure_element/1.0/vts/functional/Android.bp b/secure_element/1.0/vts/functional/Android.bp
new file mode 100644
index 0000000..752df9e
--- /dev/null
+++ b/secure_element/1.0/vts/functional/Android.bp
@@ -0,0 +1,24 @@
+//
+// Copyright (C) 2018 The Android Open Source Project
+//
+// Licensed under the Apache License, Version 2.0 (the "License");
+// you may not use this file except in compliance with the License.
+// You may obtain a copy of the License at
+//
+// http://www.apache.org/licenses/LICENSE-2.0
+//
+// Unless required by applicable law or agreed to in writing, software
+// distributed under the License is distributed on an "AS IS" BASIS,
+// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+// See the License for the specific language governing permissions and
+// limitations under the License.
+//
+
+cc_test {
+ name: "VtsHalSecureElementV1_0TargetTest",
+ defaults: ["VtsHalTargetTestDefaults"],
+ srcs: ["VtsHalSecureElementV1_0TargetTest.cpp"],
+ static_libs: [
+ "android.hardware.secure_element@1.0",
+ ],
+}
diff --git a/secure_element/1.0/vts/functional/VtsHalSecureElementV1_0TargetTest.cpp b/secure_element/1.0/vts/functional/VtsHalSecureElementV1_0TargetTest.cpp
new file mode 100644
index 0000000..2045e44
--- /dev/null
+++ b/secure_element/1.0/vts/functional/VtsHalSecureElementV1_0TargetTest.cpp
@@ -0,0 +1,248 @@
+/*
+ * Copyright (C) 2018 The Android Open Source Project
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+#define LOG_TAG "secure_element_hidl_hal_test"
+#include <android-base/logging.h>
+
+#include <android/hardware/secure_element/1.0/ISecureElement.h>
+#include <android/hardware/secure_element/1.0/ISecureElementHalCallback.h>
+#include <android/hardware/secure_element/1.0/types.h>
+
+#include <VtsHalHidlTargetCallbackBase.h>
+#include <VtsHalHidlTargetTestBase.h>
+#include <VtsHalHidlTargetTestEnvBase.h>
+
+using ::android::hardware::secure_element::V1_0::ISecureElement;
+using ::android::hardware::secure_element::V1_0::ISecureElementHalCallback;
+using ::android::hardware::secure_element::V1_0::SecureElementStatus;
+using ::android::hardware::secure_element::V1_0::LogicalChannelResponse;
+using ::android::hardware::Return;
+using ::android::hardware::Void;
+using ::android::sp;
+using ::testing::VtsHalHidlTargetTestEnvBase;
+
+#define SELECT_ISD \
+ { 0x00, 0xA4, 0x04, 0x00, 0x00 }
+#define SEQUENCE_COUNTER \
+ { 0x80, 0xCA, 0x00, 0xC1, 0x00 }
+#define MANAGE_SELECT \
+ { 0x00, 0xA4, 0x04, 0x00, 0x00 }
+#define CRS_AID \
+ { 0xA0, 0x00, 0x00, 0x01, 0x51, 0x43, 0x52, 0x53, 0x00 }
+
+constexpr char kCallbackNameOnStateChange[] = "onStateChange";
+
+class SecureElementCallbackArgs {
+ public:
+ bool state_;
+};
+
+class SecureElementHalCallback
+ : public ::testing::VtsHalHidlTargetCallbackBase<SecureElementCallbackArgs>,
+ public ISecureElementHalCallback {
+ public:
+ virtual ~SecureElementHalCallback() = default;
+
+ Return<void> onStateChange(bool state) override {
+ SecureElementCallbackArgs args;
+ args.state_ = state;
+ NotifyFromCallback(kCallbackNameOnStateChange, args);
+ return Void();
+ };
+};
+
+class SecureElementHidlEnvironment : public VtsHalHidlTargetTestEnvBase {
+ public:
+ // get the test environment singleton
+ static SecureElementHidlEnvironment* Instance() {
+ static SecureElementHidlEnvironment* instance = new SecureElementHidlEnvironment;
+ return instance;
+ }
+
+ virtual void registerTestServices() override { registerTestService<ISecureElement>(); }
+
+ private:
+ SecureElementHidlEnvironment() {}
+
+ GTEST_DISALLOW_COPY_AND_ASSIGN_(SecureElementHidlEnvironment);
+};
+
+class SecureElementHidlTest : public ::testing::VtsHalHidlTargetTestBase {
+ public:
+ virtual void SetUp() override {
+ std::string serviceName =
+ SecureElementHidlEnvironment::Instance()->getServiceName<ISecureElement>("eSE1");
+ LOG(INFO) << "get service with name:" << serviceName;
+ ASSERT_FALSE(serviceName.empty());
+ se_ = ::testing::VtsHalHidlTargetTestBase::getService<ISecureElement>(serviceName);
+ ASSERT_NE(se_, nullptr);
+
+ se_cb_ = new SecureElementHalCallback();
+ ASSERT_NE(se_cb_, nullptr);
+ }
+
+ sp<ISecureElement> se_;
+ sp<SecureElementHalCallback> se_cb_;
+};
+
+/*
+ * isCardPresent:
+ * Expects the card to be present
+ */
+TEST_F(SecureElementHidlTest, isCardPresent) {
+ EXPECT_TRUE(se_->isCardPresent());
+}
+
+/*
+ * transmit:
+ * Check status word in the response
+ */
+TEST_F(SecureElementHidlTest, transmit) {
+ std::vector<uint8_t> aid = CRS_AID;
+ SecureElementStatus statusReturned;
+ LogicalChannelResponse response;
+ se_->openLogicalChannel(
+ aid, 0x00,
+ [&statusReturned, &response](LogicalChannelResponse channelResponse,
+ SecureElementStatus status) {
+ statusReturned = status;
+ if (status == SecureElementStatus::SUCCESS) {
+ response.channelNumber = channelResponse.channelNumber;
+ response.selectResponse.resize(channelResponse.selectResponse.size());
+ for (size_t i = 0; i < channelResponse.selectResponse.size(); i++) {
+ response.selectResponse[i] = channelResponse.selectResponse[i];
+ }
+ }
+ });
+ EXPECT_EQ(SecureElementStatus::SUCCESS, statusReturned);
+ EXPECT_LE((unsigned int)3, response.selectResponse.size());
+ EXPECT_LE(1, response.channelNumber);
+ std::vector<uint8_t> command = SELECT_ISD;
+ std::vector<uint8_t> transmitResponse;
+ se_->transmit(command, [&transmitResponse](std::vector<uint8_t> res) {
+ transmitResponse.resize(res.size());
+ for (size_t i = 0; i < res.size(); i++) {
+ transmitResponse[i] = res[i];
+ }
+ });
+ EXPECT_LE((unsigned int)3, transmitResponse.size());
+ EXPECT_EQ(0x90, transmitResponse[transmitResponse.size() - 2]);
+ EXPECT_EQ(0x00, transmitResponse[transmitResponse.size() - 1]);
+ command = SEQUENCE_COUNTER;
+ se_->transmit(command, [&transmitResponse](std::vector<uint8_t> res) {
+ transmitResponse.resize(res.size());
+ for (size_t i = 0; i < res.size(); i++) {
+ transmitResponse[i] = res[i];
+ }
+ });
+ EXPECT_LE((unsigned int)3, transmitResponse.size());
+ EXPECT_EQ(0x90, transmitResponse[transmitResponse.size() - 2]);
+ EXPECT_EQ(0x00, transmitResponse[transmitResponse.size() - 1]);
+ EXPECT_EQ(SecureElementStatus::SUCCESS, se_->closeChannel(response.channelNumber));
+}
+
+/*
+ * OpenCloseBasicChannel:
+ * If the secure element allows opening of basic channel:
+ * open channel, check the length of selectResponse and close the channel
+ */
+TEST_F(SecureElementHidlTest, openBasicChannel) {
+ std::vector<uint8_t> aid = CRS_AID;
+ SecureElementStatus statusReturned;
+ std::vector<uint8_t> response;
+ se_->openBasicChannel(aid, 0x00,
+ [&statusReturned, &response](std::vector<uint8_t> selectResponse,
+ SecureElementStatus status) {
+ statusReturned = status;
+ if (status == SecureElementStatus::SUCCESS) {
+ response.resize(selectResponse.size());
+ for (size_t i = 0; i < selectResponse.size(); i++) {
+ response[i] = selectResponse[i];
+ }
+ }
+ });
+ if (statusReturned == SecureElementStatus::SUCCESS) {
+ EXPECT_LE((unsigned int)3, response.size());
+ std::vector<uint8_t> command = SELECT_ISD;
+ std::vector<uint8_t> transmitResponse;
+ se_->transmit(command, [&transmitResponse](std::vector<uint8_t> res) {
+ transmitResponse.resize(res.size());
+ for (size_t i = 0; i < res.size(); i++) {
+ transmitResponse[i] = res[i];
+ }
+ });
+ EXPECT_LE((unsigned int)3, transmitResponse.size());
+ EXPECT_EQ(0x90, transmitResponse[transmitResponse.size() - 2]);
+ EXPECT_EQ(0x00, transmitResponse[transmitResponse.size() - 1]);
+ return;
+ }
+ EXPECT_EQ(SecureElementStatus::UNSUPPORTED_OPERATION, statusReturned);
+}
+
+/*
+ * GetATR
+ */
+TEST_F(SecureElementHidlTest, getAtr) {
+ std::vector<uint8_t> atr;
+ se_->getAtr([&atr](std::vector<uint8_t> atrReturned) {
+ atr.resize(atrReturned.size());
+ for (size_t i = 0; i < atrReturned.size(); i++) {
+ atr[i] = atrReturned[i];
+ }
+ });
+ if (atr.size() == 0) {
+ return;
+ }
+ EXPECT_GE((unsigned int)32, atr.size());
+ EXPECT_LE((unsigned int)1, atr.size());
+}
+
+/*
+ * OpenCloseLogicalChannel:
+ * Open Channel
+ * Check status
+ * Close Channel
+ */
+TEST_F(SecureElementHidlTest, openCloseLogicalChannel) {
+ std::vector<uint8_t> aid = CRS_AID;
+ SecureElementStatus statusReturned;
+ LogicalChannelResponse response;
+ se_->openLogicalChannel(
+ aid, 0x00,
+ [&statusReturned, &response](LogicalChannelResponse channelResponse,
+ SecureElementStatus status) {
+ statusReturned = status;
+ if (status == SecureElementStatus::SUCCESS) {
+ response.channelNumber = channelResponse.channelNumber;
+ response.selectResponse.resize(channelResponse.selectResponse.size());
+ for (size_t i = 0; i < channelResponse.selectResponse.size(); i++) {
+ response.selectResponse[i] = channelResponse.selectResponse[i];
+ }
+ }
+ });
+ EXPECT_EQ(SecureElementStatus::SUCCESS, statusReturned);
+ EXPECT_LE((unsigned int)3, response.selectResponse.size());
+ EXPECT_LE(1, response.channelNumber);
+ EXPECT_EQ(SecureElementStatus::SUCCESS, se_->closeChannel(response.channelNumber));
+}
+
+int main(int argc, char** argv) {
+ ::testing::AddGlobalTestEnvironment(SecureElementHidlEnvironment::Instance());
+ ::testing::InitGoogleTest(&argc, argv);
+ SecureElementHidlEnvironment::Instance()->init(&argc, argv);
+ int status = RUN_ALL_TESTS();
+ return status;
+}