diff options
author | Suhas Suresh <suhas.suresh_1@nxp.com> | 2018-05-29 19:15:22 +0530 |
---|---|---|
committer | nxf24591 <nanjesh.s_1@nxp.com> | 2018-06-14 11:26:04 +0530 |
commit | c0c9ac4bc4179d7ab36c8839d0a21043f1eb023f (patch) | |
tree | 868bcfcec0b7cf29658cb76af388c1215c719d5e /src/com/android/se/SecureElementService.java | |
parent | f2eb726f806a86fdc6baadf1589d0eb901d88dce (diff) |
(FN_AOSP->P_ROW): Code drop SecureElement OMAPI service
Diffstat (limited to 'src/com/android/se/SecureElementService.java')
-rw-r--r-- | src/com/android/se/SecureElementService.java | 328 |
1 files changed, 328 insertions, 0 deletions
diff --git a/src/com/android/se/SecureElementService.java b/src/com/android/se/SecureElementService.java new file mode 100644 index 0000000..b38cb22 --- /dev/null +++ b/src/com/android/se/SecureElementService.java @@ -0,0 +1,328 @@ +/* + * Copyright (C) 2017 The Android Open Source Project + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +/* + * Copyright (c) 2014-2017, The Linux Foundation. + */ +/* + * Contributed by: Giesecke & Devrient GmbH. + */ + +package com.android.se; + +import android.app.Service; +import android.content.Context; +import android.content.Intent; +import android.content.pm.PackageManager; +import android.os.Binder; +import android.os.IBinder; +import android.os.RemoteException; +import android.os.ServiceManager; +import android.os.ServiceSpecificException; +import android.se.omapi.ISecureElementChannel; +import android.se.omapi.ISecureElementListener; +import android.se.omapi.ISecureElementReader; +import android.se.omapi.ISecureElementService; +import android.se.omapi.ISecureElementSession; +import android.se.omapi.SEService; +import android.util.Log; + +import com.android.se.Terminal.SecureElementReader; + +import java.io.FileDescriptor; +import java.io.IOException; +import java.io.PrintWriter; +import java.security.AccessControlException; +import java.util.ArrayList; +import java.util.LinkedHashMap; +import java.util.List; +import java.util.NoSuchElementException; + +/** + * Underlying implementation for OMAPI SEService + */ +public final class SecureElementService extends Service { + + public static final String UICC_TERMINAL = "SIM"; + public static final String ESE_TERMINAL = "eSE"; + private final String mTag = "SecureElementService"; + // LinkedHashMap will maintain the order of insertion + private LinkedHashMap<String, Terminal> mTerminals = new LinkedHashMap<String, Terminal>(); + private final ISecureElementService.Stub mSecureElementServiceBinder = + new ISecureElementService.Stub() { + + @Override + public String[] getReaders() throws RemoteException { + return mTerminals.keySet().toArray(new String[mTerminals.size()]); + } + + @Override + public ISecureElementReader getReader(String reader) + throws RemoteException { + Log.d(mTag, "getReader() " + reader); + Terminal terminal = getTerminal(reader); + return terminal.new SecureElementReader(SecureElementService.this); + } + + @Override + public synchronized boolean[] isNFCEventAllowed(String reader, byte[] aid, + String[] packageNames) + throws RemoteException { + if (aid == null || aid.length == 0) { + aid = new byte[]{0x00, 0x00, 0x00, 0x00, 0x00}; + } + if (aid.length < 5 || aid.length > 16) { + throw new IllegalArgumentException("AID out of range"); + } + if (packageNames == null || packageNames.length == 0) { + throw new IllegalArgumentException("package names not specified"); + } + Terminal terminal = getTerminal(reader); + return terminal.isNfcEventAllowed(getPackageManager(), aid, packageNames); + } + + @Override + protected void dump(FileDescriptor fd, PrintWriter writer, String[] args) { + for (Terminal terminal : mTerminals.values()) { + terminal.dump(writer); + } + } + }; + + public SecureElementService() { + super(); + } + + /** Returns the terminal from the Reader name. */ + private Terminal getTerminal(String reader) { + if (reader == null) { + throw new NullPointerException("reader must not be null"); + } + if (reader.equals("SIM")) { + reader = "SIM1"; + } + Terminal terminal = mTerminals.get(reader); + if (terminal == null) { + throw new IllegalArgumentException("Reader: " + reader + " doesn't exist"); + } + return terminal; + } + + @Override + public IBinder onBind(Intent intent) { + Log.i(mTag, Thread.currentThread().getName() + " onBind"); + if (ISecureElementService.class.getName().equals(intent.getAction())) { + return mSecureElementServiceBinder; + } + return null; + } + + @Override + public void onCreate() { + Log.i(mTag, Thread.currentThread().getName() + " onCreate"); + createTerminals(); + ServiceManager.addService(Context.SECURE_ELEMENT_SERVICE, mSecureElementServiceBinder); + } + + /** + * In case the onDestroy is called, we free the memory and + * close all the channels. + */ + public void onDestroy() { + Log.i(mTag, "onDestroy"); + for (Terminal terminal : mTerminals.values()) { + terminal.closeChannels(); + terminal.close(); + } + } + + private void addTerminals(String terminalName) { + int index = 1; + String name = null; + try { + do { + name = terminalName + Integer.toString(index); + Terminal terminal = new Terminal(name, this); + terminal.initialize(); + mTerminals.put(name, terminal); + } while (++index > 0); + } catch (NoSuchElementException e) { + Log.i(mTag, "No HAL implementation for " + name); + } catch (RemoteException | RuntimeException e) { + Log.e(mTag, "Error in getService() for " + name); + } + } + + private void createTerminals() { + // Check for all SE HAL implementations + addTerminals(ESE_TERMINAL); + addTerminals(UICC_TERMINAL); + } + + private String getPackageNameFromCallingUid(int uid) { + PackageManager packageManager = getPackageManager(); + if (packageManager != null) { + String[] packageName = packageManager.getPackagesForUid(uid); + if (packageName != null && packageName.length > 0) { + return packageName[0]; + } + } + throw new AccessControlException("PackageName can not be determined"); + } + + final class SecureElementSession extends ISecureElementSession.Stub { + + private final SecureElementReader mReader; + /** List of open channels in use of by this client. */ + private final List<Channel> mChannels = new ArrayList<>(); + private final Object mLock = new Object(); + private boolean mIsClosed; + private byte[] mAtr; + + SecureElementSession(SecureElementReader reader) { + if (reader == null) { + throw new NullPointerException("SecureElementReader cannot be null"); + } + mReader = reader; + mAtr = mReader.getAtr(); + mIsClosed = false; + } + + public ISecureElementReader getReader() throws RemoteException { + return mReader; + } + + @Override + public byte[] getAtr() throws RemoteException { + return mAtr; + } + + @Override + public void close() throws RemoteException { + closeChannels(); + mReader.removeSession(this); + synchronized (mLock) { + mIsClosed = true; + } + } + + void removeChannel(Channel channel) { + synchronized (mLock) { + if (mChannels != null) { + mChannels.remove(channel); + } + } + } + + @Override + public void closeChannels() throws RemoteException { + synchronized (mLock) { + while (mChannels.size() > 0) { + try { + mChannels.get(0).close(); + } catch (Exception ignore) { + Log.e(mTag, "SecureElementSession Channel - close Exception " + + ignore.getMessage()); + } + } + } + } + + @Override + public boolean isClosed() throws RemoteException { + synchronized (mLock) { + return mIsClosed; + } + } + + @Override + public ISecureElementChannel openBasicChannel(byte[] aid, byte p2, + ISecureElementListener listener) throws RemoteException { + if (isClosed()) { + throw new IllegalStateException("Session is closed"); + } else if (listener == null) { + throw new NullPointerException("listener must not be null"); + } else if (mReader.getTerminal().getName().startsWith( + SecureElementService.UICC_TERMINAL)) { + return null; + } else if ((p2 != 0x00) && (p2 != 0x04) && (p2 != 0x08) + && (p2 != (byte) 0x0C)) { + throw new UnsupportedOperationException("p2 not supported: " + + String.format("%02x ", p2 & 0xFF)); + } + + String packageName = getPackageNameFromCallingUid(Binder.getCallingUid()); + Channel channel = null; + + try { + channel = mReader.getTerminal().openBasicChannel(this, aid, p2, listener, + packageName, Binder.getCallingPid()); + } catch (IOException e) { + throw new ServiceSpecificException(SEService.IO_ERROR, e.getMessage()); + } catch (NoSuchElementException e) { + throw new ServiceSpecificException(SEService.NO_SUCH_ELEMENT_ERROR, e.getMessage()); + } + + if (channel == null) { + Log.i(mTag, "OpenBasicChannel() - returning null"); + return null; + } + Log.i(mTag, "Open basic channel success. Channel: " + + channel.getChannelNumber()); + + mChannels.add(channel); + return channel.new SecureElementChannel(); + } + + @Override + public ISecureElementChannel openLogicalChannel(byte[] aid, byte p2, + ISecureElementListener listener) throws RemoteException { + if (isClosed()) { + throw new IllegalStateException("Session is closed"); + } else if (listener == null) { + throw new NullPointerException("listener must not be null"); + } else if (((aid == null) || (aid.length == 0)) && mReader.getTerminal().getName() + .startsWith(SecureElementService.UICC_TERMINAL)) { + return null; + } else if ((p2 != 0x00) && (p2 != 0x04) && (p2 != 0x08) + && (p2 != (byte) 0x0C)) { + throw new UnsupportedOperationException("p2 not supported: " + + String.format("%02x ", p2 & 0xFF)); + } + + String packageName = getPackageNameFromCallingUid(Binder.getCallingUid()); + Channel channel = null; + + try { + channel = mReader.getTerminal().openLogicalChannel(this, aid, p2, listener, + packageName, Binder.getCallingPid()); + } catch (IOException e) { + throw new ServiceSpecificException(SEService.IO_ERROR, e.getMessage()); + } catch (NoSuchElementException e) { + throw new ServiceSpecificException(SEService.NO_SUCH_ELEMENT_ERROR, e.getMessage()); + } + + if (channel == null) { + Log.i(mTag, "openLogicalChannel() - returning null"); + return null; + } + Log.i(mTag, "openLogicalChannel() Success. Channel: " + + channel.getChannelNumber()); + + mChannels.add(channel); + return channel.new SecureElementChannel(); + } + } +} |