diff options
author | Jim Miller | 2015-05-07 20:52:53 -0500 |
---|---|---|
committer | Jim Miller | 2015-05-20 16:55:31 -0500 |
commit | a34dc46c360d42d843f5fcba22d35862139bacee (patch) | |
tree | 036a1ecc625111a436b31f3d5b0004a81e7da739 /fingerprintd/FingerprintDaemonProxy.cpp | |
parent | 7eb3abdb3ba500d3acca82b95705f34128251015 (diff) | |
download | platform-system-core-a34dc46c360d42d843f5fcba22d35862139bacee.tar.gz platform-system-core-a34dc46c360d42d843f5fcba22d35862139bacee.tar.xz platform-system-core-a34dc46c360d42d843f5fcba22d35862139bacee.zip |
Move from native FingerprintService implementation to fingerprintd
This adds a new service, fingerprintd, that manages fingerprint
hardware from a separate process. It provides a binder interface that
FingerprintManager uses to talk to the fingerprint HAL.
Change-Id: I64b92589f4d75743ebe96894f07bec515945c61e
Diffstat (limited to 'fingerprintd/FingerprintDaemonProxy.cpp')
-rw-r--r-- | fingerprintd/FingerprintDaemonProxy.cpp | 238 |
1 files changed, 238 insertions, 0 deletions
diff --git a/fingerprintd/FingerprintDaemonProxy.cpp b/fingerprintd/FingerprintDaemonProxy.cpp new file mode 100644 index 000000000..2091a2c56 --- /dev/null +++ b/fingerprintd/FingerprintDaemonProxy.cpp | |||
@@ -0,0 +1,238 @@ | |||
1 | /* | ||
2 | * Copyright (C) 2015 The Android Open Source Project | ||
3 | * | ||
4 | * Licensed under the Apache License, Version 2.0 (the "License"); | ||
5 | * you may not use this file except in compliance with the License. | ||
6 | * You may obtain a copy of the License at | ||
7 | * | ||
8 | * http://www.apache.org/licenses/LICENSE-2.0 | ||
9 | * | ||
10 | * Unless required by applicable law or agreed to in writing, software | ||
11 | * distributed under the License is distributed on an "AS IS" BASIS, | ||
12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||
13 | * See the License for the specific language governing permissions and | ||
14 | * limitations under the License. | ||
15 | */ | ||
16 | |||
17 | #define LOG_TAG "fingerprintd" | ||
18 | |||
19 | #include <binder/IServiceManager.h> | ||
20 | #include <hardware/hardware.h> | ||
21 | #include <hardware/fingerprint.h> | ||
22 | #include <hardware/hw_auth_token.h> | ||
23 | #include <keystore/IKeystoreService.h> | ||
24 | #include <keystore/keystore.h> // for error codes | ||
25 | #include <utils/Log.h> | ||
26 | |||
27 | #include "FingerprintDaemonProxy.h" | ||
28 | |||
29 | namespace android { | ||
30 | |||
31 | FingerprintDaemonProxy* FingerprintDaemonProxy::sInstance = NULL; | ||
32 | |||
33 | // Supported fingerprint HAL version | ||
34 | static const uint16_t kVersion = HARDWARE_MODULE_API_VERSION(2, 0); | ||
35 | |||
36 | FingerprintDaemonProxy::FingerprintDaemonProxy() : mModule(NULL), mDevice(NULL), mCallback(NULL) { | ||
37 | |||
38 | } | ||
39 | |||
40 | FingerprintDaemonProxy::~FingerprintDaemonProxy() { | ||
41 | closeHal(); | ||
42 | } | ||
43 | |||
44 | void FingerprintDaemonProxy::hal_notify_callback(fingerprint_msg_t msg) { | ||
45 | FingerprintDaemonProxy* instance = FingerprintDaemonProxy::getInstance(); | ||
46 | const sp<IFingerprintDaemonCallback> callback = instance->mCallback; | ||
47 | if (callback == NULL) { | ||
48 | ALOGE("Invalid callback object"); | ||
49 | return; | ||
50 | } | ||
51 | const int64_t device = (int64_t) instance->mDevice; | ||
52 | switch (msg.type) { | ||
53 | case FINGERPRINT_ERROR: | ||
54 | ALOGD("onError(%d)", msg.data.error); | ||
55 | callback->onError(device, msg.data.error); | ||
56 | break; | ||
57 | case FINGERPRINT_ACQUIRED: | ||
58 | ALOGD("onAcquired(%d)", msg.data.acquired.acquired_info); | ||
59 | callback->onAcquired(device, msg.data.acquired.acquired_info); | ||
60 | break; | ||
61 | case FINGERPRINT_AUTHENTICATED: | ||
62 | ALOGD("onAuthenticated(fid=%d, gid=%d)", | ||
63 | msg.data.authenticated.finger.fid, | ||
64 | msg.data.authenticated.finger.gid); | ||
65 | if (msg.data.authenticated.finger.fid != 0) { | ||
66 | uint8_t* hat = reinterpret_cast<uint8_t *>(&msg.data.authenticated.hat); | ||
67 | instance->notifyKeystore(hat, sizeof(msg.data.authenticated.hat)); | ||
68 | } | ||
69 | callback->onAuthenticated(device, | ||
70 | msg.data.authenticated.finger.fid, | ||
71 | msg.data.authenticated.finger.gid); | ||
72 | break; | ||
73 | case FINGERPRINT_TEMPLATE_ENROLLING: | ||
74 | ALOGD("onEnrollResult(fid=%d, gid=%d, rem=%d)", | ||
75 | msg.data.enroll.finger.fid, | ||
76 | msg.data.enroll.finger.gid, | ||
77 | msg.data.enroll.samples_remaining); | ||
78 | callback->onEnrollResult(device, | ||
79 | msg.data.enroll.finger.fid, | ||
80 | msg.data.enroll.finger.gid, | ||
81 | msg.data.enroll.samples_remaining); | ||
82 | break; | ||
83 | case FINGERPRINT_TEMPLATE_REMOVED: | ||
84 | ALOGD("onRemove(fid=%d, gid=%d)", | ||
85 | msg.data.removed.finger.fid, | ||
86 | msg.data.removed.finger.gid); | ||
87 | callback->onRemoved(device, | ||
88 | msg.data.removed.finger.fid, | ||
89 | msg.data.removed.finger.gid); | ||
90 | break; | ||
91 | default: | ||
92 | ALOGE("invalid msg: %d", msg.type); | ||
93 | return; | ||
94 | } | ||
95 | } | ||
96 | |||
97 | void FingerprintDaemonProxy::notifyKeystore(uint8_t *auth_token, size_t auth_token_length) { | ||
98 | if (auth_token != NULL && auth_token_length > 0) { | ||
99 | // TODO: cache service? | ||
100 | sp < IServiceManager > sm = defaultServiceManager(); | ||
101 | sp < IBinder > binder = sm->getService(String16("android.security.keystore")); | ||
102 | sp < IKeystoreService > service = interface_cast < IKeystoreService > (binder); | ||
103 | if (service != NULL) { | ||
104 | status_t ret = service->addAuthToken(auth_token, auth_token_length); | ||
105 | if (ret != ResponseCode::NO_ERROR) { | ||
106 | ALOGE("Falure sending auth token to KeyStore: %d", ret); | ||
107 | } | ||
108 | } else { | ||
109 | ALOGE("Unable to communicate with KeyStore"); | ||
110 | } | ||
111 | } | ||
112 | } | ||
113 | |||
114 | void FingerprintDaemonProxy::init(const sp<IFingerprintDaemonCallback>& callback) { | ||
115 | if (mCallback != NULL && IInterface::asBinder(callback) != IInterface::asBinder(mCallback)) { | ||
116 | IInterface::asBinder(mCallback)->unlinkToDeath(this); | ||
117 | } | ||
118 | IInterface::asBinder(callback)->linkToDeath(this); | ||
119 | mCallback = callback; | ||
120 | } | ||
121 | |||
122 | int32_t FingerprintDaemonProxy::enroll(const uint8_t* token, ssize_t tokenSize, int32_t groupId, | ||
123 | int32_t timeout) { | ||
124 | ALOG(LOG_VERBOSE, LOG_TAG, "enroll(gid=%d, timeout=%d)\n", groupId, timeout); | ||
125 | if (tokenSize != sizeof(hw_auth_token_t) ) { | ||
126 | ALOG(LOG_VERBOSE, LOG_TAG, "enroll() : invalid token size %d\n", tokenSize); | ||
127 | return -1; | ||
128 | } | ||
129 | const hw_auth_token_t* authToken = reinterpret_cast<const hw_auth_token_t*>(token); | ||
130 | return mDevice->enroll(mDevice, authToken, groupId, timeout); | ||
131 | } | ||
132 | |||
133 | uint64_t FingerprintDaemonProxy::preEnroll() { | ||
134 | return mDevice->pre_enroll(mDevice); | ||
135 | } | ||
136 | |||
137 | int32_t FingerprintDaemonProxy::stopEnrollment() { | ||
138 | ALOG(LOG_VERBOSE, LOG_TAG, "stopEnrollment()\n"); | ||
139 | return mDevice->cancel(mDevice); | ||
140 | } | ||
141 | |||
142 | int32_t FingerprintDaemonProxy::authenticate(uint64_t sessionId, uint32_t groupId) { | ||
143 | ALOG(LOG_VERBOSE, LOG_TAG, "authenticate(sid=%" PRId64 ", gid=%d)\n", sessionId, groupId); | ||
144 | return mDevice->authenticate(mDevice, sessionId, groupId); | ||
145 | } | ||
146 | |||
147 | int32_t FingerprintDaemonProxy::stopAuthentication() { | ||
148 | ALOG(LOG_VERBOSE, LOG_TAG, "stopAuthentication()\n"); | ||
149 | return mDevice->cancel(mDevice); | ||
150 | } | ||
151 | |||
152 | int32_t FingerprintDaemonProxy::remove(int32_t fingerId, int32_t groupId) { | ||
153 | ALOG(LOG_VERBOSE, LOG_TAG, "remove(fid=%d, gid=%d)\n", fingerId, groupId); | ||
154 | fingerprint_finger_id_t finger; | ||
155 | finger.fid = fingerId; | ||
156 | finger.gid = groupId; | ||
157 | return mDevice->remove(mDevice, finger); | ||
158 | } | ||
159 | |||
160 | uint64_t FingerprintDaemonProxy::getAuthenticatorId() { | ||
161 | return mDevice->get_authenticator_id(mDevice); | ||
162 | } | ||
163 | |||
164 | int32_t FingerprintDaemonProxy::setActiveGroup(int32_t groupId, const uint8_t* path, | ||
165 | ssize_t pathlen) { | ||
166 | if (pathlen >= PATH_MAX) { | ||
167 | ALOGE("Path name is too long\n"); | ||
168 | return -1; | ||
169 | } | ||
170 | // Convert to null-terminated string | ||
171 | char path_name[PATH_MAX]; | ||
172 | memcpy(path_name, path, pathlen); | ||
173 | path_name[pathlen] = '\0'; | ||
174 | ALOG(LOG_VERBOSE, LOG_TAG, "setActiveGroup(%d, %s, %d)", groupId, path_name, pathlen); | ||
175 | return mDevice->set_active_group(mDevice, groupId, path_name); | ||
176 | return -1; | ||
177 | } | ||
178 | |||
179 | int64_t FingerprintDaemonProxy::openHal() { | ||
180 | ALOG(LOG_VERBOSE, LOG_TAG, "nativeOpenHal()\n"); | ||
181 | int err; | ||
182 | const hw_module_t *hw_module = NULL; | ||
183 | if (0 != (err = hw_get_module(FINGERPRINT_HARDWARE_MODULE_ID, &hw_module))) { | ||
184 | ALOGE("Can't open fingerprint HW Module, error: %d", err); | ||
185 | return 0; | ||
186 | } | ||
187 | if (NULL == hw_module) { | ||
188 | ALOGE("No valid fingerprint module"); | ||
189 | return 0; | ||
190 | } | ||
191 | |||
192 | mModule = reinterpret_cast<const fingerprint_module_t*>(hw_module); | ||
193 | |||
194 | if (mModule->common.methods->open == NULL) { | ||
195 | ALOGE("No valid open method"); | ||
196 | return 0; | ||
197 | } | ||
198 | |||
199 | hw_device_t *device = NULL; | ||
200 | |||
201 | if (0 != (err = mModule->common.methods->open(hw_module, NULL, &device))) { | ||
202 | ALOGE("Can't open fingerprint methods, error: %d", err); | ||
203 | return 0; | ||
204 | } | ||
205 | |||
206 | if (kVersion != device->version) { | ||
207 | ALOGE("Wrong fp version. Expected %d, got %d", kVersion, device->version); | ||
208 | // return 0; // FIXME | ||
209 | } | ||
210 | |||
211 | mDevice = reinterpret_cast<fingerprint_device_t*>(device); | ||
212 | err = mDevice->set_notify(mDevice, hal_notify_callback); | ||
213 | if (err < 0) { | ||
214 | ALOGE("Failed in call to set_notify(), err=%d", err); | ||
215 | return 0; | ||
216 | } | ||
217 | |||
218 | // Sanity check - remove | ||
219 | if (mDevice->notify != hal_notify_callback) { | ||
220 | ALOGE("NOTIFY not set properly: %p != %p", mDevice->notify, hal_notify_callback); | ||
221 | } | ||
222 | |||
223 | ALOG(LOG_VERBOSE, LOG_TAG, "fingerprint HAL successfully initialized"); | ||
224 | return reinterpret_cast<int64_t>(mDevice); // This is just a handle | ||
225 | } | ||
226 | |||
227 | int32_t FingerprintDaemonProxy::closeHal() { | ||
228 | return -ENOSYS; // TODO | ||
229 | } | ||
230 | |||
231 | void FingerprintDaemonProxy::binderDied(const wp<IBinder>& who) { | ||
232 | ALOGD("binder died"); | ||
233 | if (IInterface::asBinder(mCallback) == who) { | ||
234 | mCallback = NULL; | ||
235 | } | ||
236 | } | ||
237 | |||
238 | } | ||