| Jim Miller | a34dc46 | 2015-05-07 18:52:53 -0700 | [diff] [blame] | 1 | /* | 
|  | 2 | * Copyright (C) 2015 The Android Open Source Project | 
|  | 3 | * | 
|  | 4 | * Licensed under the Apache License, Version 2.0 (the "License"); | 
|  | 5 | * you may not use this file except in compliance with the License. | 
|  | 6 | * You may obtain a copy of the License at | 
|  | 7 | * | 
|  | 8 | *      http://www.apache.org/licenses/LICENSE-2.0 | 
|  | 9 | * | 
|  | 10 | * Unless required by applicable law or agreed to in writing, software | 
|  | 11 | * distributed under the License is distributed on an "AS IS" BASIS, | 
|  | 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
|  | 13 | * See the License for the specific language governing permissions and | 
|  | 14 | * limitations under the License. | 
|  | 15 | */ | 
|  | 16 |  | 
|  | 17 | #define LOG_TAG "fingerprintd" | 
|  | 18 |  | 
|  | 19 | #include <binder/IServiceManager.h> | 
|  | 20 | #include <hardware/hardware.h> | 
|  | 21 | #include <hardware/fingerprint.h> | 
|  | 22 | #include <hardware/hw_auth_token.h> | 
|  | 23 | #include <keystore/IKeystoreService.h> | 
|  | 24 | #include <keystore/keystore.h> // for error codes | 
|  | 25 | #include <utils/Log.h> | 
|  | 26 |  | 
|  | 27 | #include "FingerprintDaemonProxy.h" | 
|  | 28 |  | 
|  | 29 | namespace android { | 
|  | 30 |  | 
|  | 31 | FingerprintDaemonProxy* FingerprintDaemonProxy::sInstance = NULL; | 
|  | 32 |  | 
|  | 33 | // Supported fingerprint HAL version | 
|  | 34 | static const uint16_t kVersion = HARDWARE_MODULE_API_VERSION(2, 0); | 
|  | 35 |  | 
|  | 36 | FingerprintDaemonProxy::FingerprintDaemonProxy() : mModule(NULL), mDevice(NULL), mCallback(NULL) { | 
|  | 37 |  | 
|  | 38 | } | 
|  | 39 |  | 
|  | 40 | FingerprintDaemonProxy::~FingerprintDaemonProxy() { | 
|  | 41 | closeHal(); | 
|  | 42 | } | 
|  | 43 |  | 
| Sasha Levitskiy | 53afac0 | 2015-06-09 16:47:09 -0700 | [diff] [blame] | 44 | void FingerprintDaemonProxy::hal_notify_callback(const fingerprint_msg_t *msg) { | 
| Jim Miller | a34dc46 | 2015-05-07 18:52:53 -0700 | [diff] [blame] | 45 | FingerprintDaemonProxy* instance = FingerprintDaemonProxy::getInstance(); | 
|  | 46 | const sp<IFingerprintDaemonCallback> callback = instance->mCallback; | 
|  | 47 | if (callback == NULL) { | 
|  | 48 | ALOGE("Invalid callback object"); | 
|  | 49 | return; | 
|  | 50 | } | 
|  | 51 | const int64_t device = (int64_t) instance->mDevice; | 
| Sasha Levitskiy | 53afac0 | 2015-06-09 16:47:09 -0700 | [diff] [blame] | 52 | switch (msg->type) { | 
| Jim Miller | a34dc46 | 2015-05-07 18:52:53 -0700 | [diff] [blame] | 53 | case FINGERPRINT_ERROR: | 
| Sasha Levitskiy | 53afac0 | 2015-06-09 16:47:09 -0700 | [diff] [blame] | 54 | ALOGD("onError(%d)", msg->data.error); | 
|  | 55 | callback->onError(device, msg->data.error); | 
| Jim Miller | a34dc46 | 2015-05-07 18:52:53 -0700 | [diff] [blame] | 56 | break; | 
|  | 57 | case FINGERPRINT_ACQUIRED: | 
| Sasha Levitskiy | 53afac0 | 2015-06-09 16:47:09 -0700 | [diff] [blame] | 58 | ALOGD("onAcquired(%d)", msg->data.acquired.acquired_info); | 
|  | 59 | callback->onAcquired(device, msg->data.acquired.acquired_info); | 
| Jim Miller | a34dc46 | 2015-05-07 18:52:53 -0700 | [diff] [blame] | 60 | break; | 
|  | 61 | case FINGERPRINT_AUTHENTICATED: | 
|  | 62 | ALOGD("onAuthenticated(fid=%d, gid=%d)", | 
| Sasha Levitskiy | 53afac0 | 2015-06-09 16:47:09 -0700 | [diff] [blame] | 63 | msg->data.authenticated.finger.fid, | 
|  | 64 | msg->data.authenticated.finger.gid); | 
|  | 65 | if (msg->data.authenticated.finger.fid != 0) { | 
|  | 66 | const uint8_t* hat = reinterpret_cast<const uint8_t *>(&msg->data.authenticated.hat); | 
|  | 67 | instance->notifyKeystore(hat, sizeof(msg->data.authenticated.hat)); | 
| Jim Miller | a34dc46 | 2015-05-07 18:52:53 -0700 | [diff] [blame] | 68 | } | 
|  | 69 | callback->onAuthenticated(device, | 
| Sasha Levitskiy | 53afac0 | 2015-06-09 16:47:09 -0700 | [diff] [blame] | 70 | msg->data.authenticated.finger.fid, | 
|  | 71 | msg->data.authenticated.finger.gid); | 
| Jim Miller | a34dc46 | 2015-05-07 18:52:53 -0700 | [diff] [blame] | 72 | break; | 
|  | 73 | case FINGERPRINT_TEMPLATE_ENROLLING: | 
|  | 74 | ALOGD("onEnrollResult(fid=%d, gid=%d, rem=%d)", | 
| Sasha Levitskiy | 53afac0 | 2015-06-09 16:47:09 -0700 | [diff] [blame] | 75 | msg->data.enroll.finger.fid, | 
|  | 76 | msg->data.enroll.finger.gid, | 
|  | 77 | msg->data.enroll.samples_remaining); | 
| Jim Miller | a34dc46 | 2015-05-07 18:52:53 -0700 | [diff] [blame] | 78 | callback->onEnrollResult(device, | 
| Sasha Levitskiy | 53afac0 | 2015-06-09 16:47:09 -0700 | [diff] [blame] | 79 | msg->data.enroll.finger.fid, | 
|  | 80 | msg->data.enroll.finger.gid, | 
|  | 81 | msg->data.enroll.samples_remaining); | 
| Jim Miller | a34dc46 | 2015-05-07 18:52:53 -0700 | [diff] [blame] | 82 | break; | 
|  | 83 | case FINGERPRINT_TEMPLATE_REMOVED: | 
|  | 84 | ALOGD("onRemove(fid=%d, gid=%d)", | 
| Sasha Levitskiy | 53afac0 | 2015-06-09 16:47:09 -0700 | [diff] [blame] | 85 | msg->data.removed.finger.fid, | 
|  | 86 | msg->data.removed.finger.gid); | 
| Jim Miller | a34dc46 | 2015-05-07 18:52:53 -0700 | [diff] [blame] | 87 | callback->onRemoved(device, | 
| Sasha Levitskiy | 53afac0 | 2015-06-09 16:47:09 -0700 | [diff] [blame] | 88 | msg->data.removed.finger.fid, | 
|  | 89 | msg->data.removed.finger.gid); | 
| Jim Miller | a34dc46 | 2015-05-07 18:52:53 -0700 | [diff] [blame] | 90 | break; | 
|  | 91 | default: | 
| Sasha Levitskiy | 53afac0 | 2015-06-09 16:47:09 -0700 | [diff] [blame] | 92 | ALOGE("invalid msg type: %d", msg->type); | 
| Jim Miller | a34dc46 | 2015-05-07 18:52:53 -0700 | [diff] [blame] | 93 | return; | 
|  | 94 | } | 
|  | 95 | } | 
|  | 96 |  | 
| Sasha Levitskiy | 53afac0 | 2015-06-09 16:47:09 -0700 | [diff] [blame] | 97 | void FingerprintDaemonProxy::notifyKeystore(const uint8_t *auth_token, const size_t auth_token_length) { | 
| Jim Miller | a34dc46 | 2015-05-07 18:52:53 -0700 | [diff] [blame] | 98 | if (auth_token != NULL && auth_token_length > 0) { | 
|  | 99 | // TODO: cache service? | 
|  | 100 | sp < IServiceManager > sm = defaultServiceManager(); | 
|  | 101 | sp < IBinder > binder = sm->getService(String16("android.security.keystore")); | 
|  | 102 | sp < IKeystoreService > service = interface_cast < IKeystoreService > (binder); | 
|  | 103 | if (service != NULL) { | 
|  | 104 | status_t ret = service->addAuthToken(auth_token, auth_token_length); | 
|  | 105 | if (ret != ResponseCode::NO_ERROR) { | 
|  | 106 | ALOGE("Falure sending auth token to KeyStore: %d", ret); | 
|  | 107 | } | 
|  | 108 | } else { | 
|  | 109 | ALOGE("Unable to communicate with KeyStore"); | 
|  | 110 | } | 
|  | 111 | } | 
|  | 112 | } | 
|  | 113 |  | 
|  | 114 | void FingerprintDaemonProxy::init(const sp<IFingerprintDaemonCallback>& callback) { | 
|  | 115 | if (mCallback != NULL && IInterface::asBinder(callback) != IInterface::asBinder(mCallback)) { | 
|  | 116 | IInterface::asBinder(mCallback)->unlinkToDeath(this); | 
|  | 117 | } | 
|  | 118 | IInterface::asBinder(callback)->linkToDeath(this); | 
|  | 119 | mCallback = callback; | 
|  | 120 | } | 
|  | 121 |  | 
|  | 122 | int32_t FingerprintDaemonProxy::enroll(const uint8_t* token, ssize_t tokenSize, int32_t groupId, | 
|  | 123 | int32_t timeout) { | 
|  | 124 | ALOG(LOG_VERBOSE, LOG_TAG, "enroll(gid=%d, timeout=%d)\n", groupId, timeout); | 
|  | 125 | if (tokenSize != sizeof(hw_auth_token_t) ) { | 
| Jim Miller | 72ffc3c | 2015-06-05 12:25:17 -0700 | [diff] [blame] | 126 | ALOG(LOG_VERBOSE, LOG_TAG, "enroll() : invalid token size %zu\n", tokenSize); | 
| Jim Miller | a34dc46 | 2015-05-07 18:52:53 -0700 | [diff] [blame] | 127 | return -1; | 
|  | 128 | } | 
|  | 129 | const hw_auth_token_t* authToken = reinterpret_cast<const hw_auth_token_t*>(token); | 
|  | 130 | return mDevice->enroll(mDevice, authToken, groupId, timeout); | 
|  | 131 | } | 
|  | 132 |  | 
|  | 133 | uint64_t FingerprintDaemonProxy::preEnroll() { | 
|  | 134 | return mDevice->pre_enroll(mDevice); | 
|  | 135 | } | 
|  | 136 |  | 
| Sasha Levitskiy | 7ded579 | 2015-06-25 15:53:41 -0700 | [diff] [blame] | 137 | int32_t FingerprintDaemonProxy::postEnroll() { | 
|  | 138 | return mDevice->post_enroll(mDevice); | 
|  | 139 | } | 
|  | 140 |  | 
| Jim Miller | a34dc46 | 2015-05-07 18:52:53 -0700 | [diff] [blame] | 141 | int32_t FingerprintDaemonProxy::stopEnrollment() { | 
|  | 142 | ALOG(LOG_VERBOSE, LOG_TAG, "stopEnrollment()\n"); | 
|  | 143 | return mDevice->cancel(mDevice); | 
|  | 144 | } | 
|  | 145 |  | 
|  | 146 | int32_t FingerprintDaemonProxy::authenticate(uint64_t sessionId, uint32_t groupId) { | 
|  | 147 | ALOG(LOG_VERBOSE, LOG_TAG, "authenticate(sid=%" PRId64 ", gid=%d)\n", sessionId, groupId); | 
|  | 148 | return mDevice->authenticate(mDevice, sessionId, groupId); | 
|  | 149 | } | 
|  | 150 |  | 
|  | 151 | int32_t FingerprintDaemonProxy::stopAuthentication() { | 
|  | 152 | ALOG(LOG_VERBOSE, LOG_TAG, "stopAuthentication()\n"); | 
|  | 153 | return mDevice->cancel(mDevice); | 
|  | 154 | } | 
|  | 155 |  | 
|  | 156 | int32_t FingerprintDaemonProxy::remove(int32_t fingerId, int32_t groupId) { | 
|  | 157 | ALOG(LOG_VERBOSE, LOG_TAG, "remove(fid=%d, gid=%d)\n", fingerId, groupId); | 
| Sasha Levitskiy | 53afac0 | 2015-06-09 16:47:09 -0700 | [diff] [blame] | 158 | return mDevice->remove(mDevice, groupId, fingerId); | 
| Jim Miller | a34dc46 | 2015-05-07 18:52:53 -0700 | [diff] [blame] | 159 | } | 
|  | 160 |  | 
|  | 161 | uint64_t FingerprintDaemonProxy::getAuthenticatorId() { | 
|  | 162 | return mDevice->get_authenticator_id(mDevice); | 
|  | 163 | } | 
|  | 164 |  | 
|  | 165 | int32_t FingerprintDaemonProxy::setActiveGroup(int32_t groupId, const uint8_t* path, | 
|  | 166 | ssize_t pathlen) { | 
| Sasha Levitskiy | 99115b9 | 2015-06-18 16:08:14 -0700 | [diff] [blame] | 167 | if (pathlen >= PATH_MAX || pathlen <= 0) { | 
|  | 168 | ALOGE("Bad path length: %zd", pathlen); | 
| Jim Miller | a34dc46 | 2015-05-07 18:52:53 -0700 | [diff] [blame] | 169 | return -1; | 
|  | 170 | } | 
|  | 171 | // Convert to null-terminated string | 
|  | 172 | char path_name[PATH_MAX]; | 
|  | 173 | memcpy(path_name, path, pathlen); | 
|  | 174 | path_name[pathlen] = '\0'; | 
| Jim Miller | 72ffc3c | 2015-06-05 12:25:17 -0700 | [diff] [blame] | 175 | ALOG(LOG_VERBOSE, LOG_TAG, "setActiveGroup(%d, %s, %zu)", groupId, path_name, pathlen); | 
| Jim Miller | a34dc46 | 2015-05-07 18:52:53 -0700 | [diff] [blame] | 176 | return mDevice->set_active_group(mDevice, groupId, path_name); | 
| Jim Miller | a34dc46 | 2015-05-07 18:52:53 -0700 | [diff] [blame] | 177 | } | 
|  | 178 |  | 
|  | 179 | int64_t FingerprintDaemonProxy::openHal() { | 
|  | 180 | ALOG(LOG_VERBOSE, LOG_TAG, "nativeOpenHal()\n"); | 
|  | 181 | int err; | 
|  | 182 | const hw_module_t *hw_module = NULL; | 
|  | 183 | if (0 != (err = hw_get_module(FINGERPRINT_HARDWARE_MODULE_ID, &hw_module))) { | 
|  | 184 | ALOGE("Can't open fingerprint HW Module, error: %d", err); | 
|  | 185 | return 0; | 
|  | 186 | } | 
|  | 187 | if (NULL == hw_module) { | 
|  | 188 | ALOGE("No valid fingerprint module"); | 
|  | 189 | return 0; | 
|  | 190 | } | 
|  | 191 |  | 
|  | 192 | mModule = reinterpret_cast<const fingerprint_module_t*>(hw_module); | 
|  | 193 |  | 
|  | 194 | if (mModule->common.methods->open == NULL) { | 
|  | 195 | ALOGE("No valid open method"); | 
|  | 196 | return 0; | 
|  | 197 | } | 
|  | 198 |  | 
|  | 199 | hw_device_t *device = NULL; | 
|  | 200 |  | 
|  | 201 | if (0 != (err = mModule->common.methods->open(hw_module, NULL, &device))) { | 
|  | 202 | ALOGE("Can't open fingerprint methods, error: %d", err); | 
|  | 203 | return 0; | 
|  | 204 | } | 
|  | 205 |  | 
|  | 206 | if (kVersion != device->version) { | 
|  | 207 | ALOGE("Wrong fp version. Expected %d, got %d", kVersion, device->version); | 
|  | 208 | // return 0; // FIXME | 
|  | 209 | } | 
|  | 210 |  | 
|  | 211 | mDevice = reinterpret_cast<fingerprint_device_t*>(device); | 
|  | 212 | err = mDevice->set_notify(mDevice, hal_notify_callback); | 
|  | 213 | if (err < 0) { | 
|  | 214 | ALOGE("Failed in call to set_notify(), err=%d", err); | 
|  | 215 | return 0; | 
|  | 216 | } | 
|  | 217 |  | 
|  | 218 | // Sanity check - remove | 
|  | 219 | if (mDevice->notify != hal_notify_callback) { | 
|  | 220 | ALOGE("NOTIFY not set properly: %p != %p", mDevice->notify, hal_notify_callback); | 
|  | 221 | } | 
|  | 222 |  | 
|  | 223 | ALOG(LOG_VERBOSE, LOG_TAG, "fingerprint HAL successfully initialized"); | 
|  | 224 | return reinterpret_cast<int64_t>(mDevice); // This is just a handle | 
|  | 225 | } | 
|  | 226 |  | 
|  | 227 | int32_t FingerprintDaemonProxy::closeHal() { | 
| Sasha Levitskiy | dae4837 | 2015-07-10 14:24:30 -0700 | [diff] [blame] | 228 | ALOG(LOG_VERBOSE, LOG_TAG, "nativeCloseHal()\n"); | 
|  | 229 | if (mDevice == NULL) { | 
|  | 230 | ALOGE("No valid device"); | 
|  | 231 | return -ENOSYS; | 
|  | 232 | } | 
|  | 233 | int err; | 
|  | 234 | if (0 != (err = mDevice->common.close(reinterpret_cast<hw_device_t*>(mDevice)))) { | 
|  | 235 | ALOGE("Can't close fingerprint module, error: %d", err); | 
|  | 236 | return err; | 
|  | 237 | } | 
|  | 238 | mDevice = NULL; | 
|  | 239 | return 0; | 
| Jim Miller | a34dc46 | 2015-05-07 18:52:53 -0700 | [diff] [blame] | 240 | } | 
|  | 241 |  | 
|  | 242 | void FingerprintDaemonProxy::binderDied(const wp<IBinder>& who) { | 
|  | 243 | ALOGD("binder died"); | 
| Sasha Levitskiy | dae4837 | 2015-07-10 14:24:30 -0700 | [diff] [blame] | 244 | int err; | 
|  | 245 | if (0 != (err = closeHal())) { | 
|  | 246 | ALOGE("Can't close fingerprint device, error: %d", err); | 
|  | 247 | } | 
| Jim Miller | a34dc46 | 2015-05-07 18:52:53 -0700 | [diff] [blame] | 248 | if (IInterface::asBinder(mCallback) == who) { | 
|  | 249 | mCallback = NULL; | 
|  | 250 | } | 
|  | 251 | } | 
|  | 252 |  | 
|  | 253 | } |