summaryrefslogtreecommitdiff
path: root/src/com/android/se/SecureElementService.java
diff options
context:
space:
mode:
Diffstat (limited to 'src/com/android/se/SecureElementService.java')
-rw-r--r--src/com/android/se/SecureElementService.java328
1 files changed, 328 insertions, 0 deletions
diff --git a/src/com/android/se/SecureElementService.java b/src/com/android/se/SecureElementService.java
new file mode 100644
index 0000000..b38cb22
--- /dev/null
+++ b/src/com/android/se/SecureElementService.java
@@ -0,0 +1,328 @@
+/*
+ * Copyright (C) 2017 The Android Open Source Project
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+/*
+ * Copyright (c) 2014-2017, The Linux Foundation.
+ */
+/*
+ * Contributed by: Giesecke & Devrient GmbH.
+ */
+
+package com.android.se;
+
+import android.app.Service;
+import android.content.Context;
+import android.content.Intent;
+import android.content.pm.PackageManager;
+import android.os.Binder;
+import android.os.IBinder;
+import android.os.RemoteException;
+import android.os.ServiceManager;
+import android.os.ServiceSpecificException;
+import android.se.omapi.ISecureElementChannel;
+import android.se.omapi.ISecureElementListener;
+import android.se.omapi.ISecureElementReader;
+import android.se.omapi.ISecureElementService;
+import android.se.omapi.ISecureElementSession;
+import android.se.omapi.SEService;
+import android.util.Log;
+
+import com.android.se.Terminal.SecureElementReader;
+
+import java.io.FileDescriptor;
+import java.io.IOException;
+import java.io.PrintWriter;
+import java.security.AccessControlException;
+import java.util.ArrayList;
+import java.util.LinkedHashMap;
+import java.util.List;
+import java.util.NoSuchElementException;
+
+/**
+ * Underlying implementation for OMAPI SEService
+ */
+public final class SecureElementService extends Service {
+
+ public static final String UICC_TERMINAL = "SIM";
+ public static final String ESE_TERMINAL = "eSE";
+ private final String mTag = "SecureElementService";
+ // LinkedHashMap will maintain the order of insertion
+ private LinkedHashMap<String, Terminal> mTerminals = new LinkedHashMap<String, Terminal>();
+ private final ISecureElementService.Stub mSecureElementServiceBinder =
+ new ISecureElementService.Stub() {
+
+ @Override
+ public String[] getReaders() throws RemoteException {
+ return mTerminals.keySet().toArray(new String[mTerminals.size()]);
+ }
+
+ @Override
+ public ISecureElementReader getReader(String reader)
+ throws RemoteException {
+ Log.d(mTag, "getReader() " + reader);
+ Terminal terminal = getTerminal(reader);
+ return terminal.new SecureElementReader(SecureElementService.this);
+ }
+
+ @Override
+ public synchronized boolean[] isNFCEventAllowed(String reader, byte[] aid,
+ String[] packageNames)
+ throws RemoteException {
+ if (aid == null || aid.length == 0) {
+ aid = new byte[]{0x00, 0x00, 0x00, 0x00, 0x00};
+ }
+ if (aid.length < 5 || aid.length > 16) {
+ throw new IllegalArgumentException("AID out of range");
+ }
+ if (packageNames == null || packageNames.length == 0) {
+ throw new IllegalArgumentException("package names not specified");
+ }
+ Terminal terminal = getTerminal(reader);
+ return terminal.isNfcEventAllowed(getPackageManager(), aid, packageNames);
+ }
+
+ @Override
+ protected void dump(FileDescriptor fd, PrintWriter writer, String[] args) {
+ for (Terminal terminal : mTerminals.values()) {
+ terminal.dump(writer);
+ }
+ }
+ };
+
+ public SecureElementService() {
+ super();
+ }
+
+ /** Returns the terminal from the Reader name. */
+ private Terminal getTerminal(String reader) {
+ if (reader == null) {
+ throw new NullPointerException("reader must not be null");
+ }
+ if (reader.equals("SIM")) {
+ reader = "SIM1";
+ }
+ Terminal terminal = mTerminals.get(reader);
+ if (terminal == null) {
+ throw new IllegalArgumentException("Reader: " + reader + " doesn't exist");
+ }
+ return terminal;
+ }
+
+ @Override
+ public IBinder onBind(Intent intent) {
+ Log.i(mTag, Thread.currentThread().getName() + " onBind");
+ if (ISecureElementService.class.getName().equals(intent.getAction())) {
+ return mSecureElementServiceBinder;
+ }
+ return null;
+ }
+
+ @Override
+ public void onCreate() {
+ Log.i(mTag, Thread.currentThread().getName() + " onCreate");
+ createTerminals();
+ ServiceManager.addService(Context.SECURE_ELEMENT_SERVICE, mSecureElementServiceBinder);
+ }
+
+ /**
+ * In case the onDestroy is called, we free the memory and
+ * close all the channels.
+ */
+ public void onDestroy() {
+ Log.i(mTag, "onDestroy");
+ for (Terminal terminal : mTerminals.values()) {
+ terminal.closeChannels();
+ terminal.close();
+ }
+ }
+
+ private void addTerminals(String terminalName) {
+ int index = 1;
+ String name = null;
+ try {
+ do {
+ name = terminalName + Integer.toString(index);
+ Terminal terminal = new Terminal(name, this);
+ terminal.initialize();
+ mTerminals.put(name, terminal);
+ } while (++index > 0);
+ } catch (NoSuchElementException e) {
+ Log.i(mTag, "No HAL implementation for " + name);
+ } catch (RemoteException | RuntimeException e) {
+ Log.e(mTag, "Error in getService() for " + name);
+ }
+ }
+
+ private void createTerminals() {
+ // Check for all SE HAL implementations
+ addTerminals(ESE_TERMINAL);
+ addTerminals(UICC_TERMINAL);
+ }
+
+ private String getPackageNameFromCallingUid(int uid) {
+ PackageManager packageManager = getPackageManager();
+ if (packageManager != null) {
+ String[] packageName = packageManager.getPackagesForUid(uid);
+ if (packageName != null && packageName.length > 0) {
+ return packageName[0];
+ }
+ }
+ throw new AccessControlException("PackageName can not be determined");
+ }
+
+ final class SecureElementSession extends ISecureElementSession.Stub {
+
+ private final SecureElementReader mReader;
+ /** List of open channels in use of by this client. */
+ private final List<Channel> mChannels = new ArrayList<>();
+ private final Object mLock = new Object();
+ private boolean mIsClosed;
+ private byte[] mAtr;
+
+ SecureElementSession(SecureElementReader reader) {
+ if (reader == null) {
+ throw new NullPointerException("SecureElementReader cannot be null");
+ }
+ mReader = reader;
+ mAtr = mReader.getAtr();
+ mIsClosed = false;
+ }
+
+ public ISecureElementReader getReader() throws RemoteException {
+ return mReader;
+ }
+
+ @Override
+ public byte[] getAtr() throws RemoteException {
+ return mAtr;
+ }
+
+ @Override
+ public void close() throws RemoteException {
+ closeChannels();
+ mReader.removeSession(this);
+ synchronized (mLock) {
+ mIsClosed = true;
+ }
+ }
+
+ void removeChannel(Channel channel) {
+ synchronized (mLock) {
+ if (mChannels != null) {
+ mChannels.remove(channel);
+ }
+ }
+ }
+
+ @Override
+ public void closeChannels() throws RemoteException {
+ synchronized (mLock) {
+ while (mChannels.size() > 0) {
+ try {
+ mChannels.get(0).close();
+ } catch (Exception ignore) {
+ Log.e(mTag, "SecureElementSession Channel - close Exception "
+ + ignore.getMessage());
+ }
+ }
+ }
+ }
+
+ @Override
+ public boolean isClosed() throws RemoteException {
+ synchronized (mLock) {
+ return mIsClosed;
+ }
+ }
+
+ @Override
+ public ISecureElementChannel openBasicChannel(byte[] aid, byte p2,
+ ISecureElementListener listener) throws RemoteException {
+ if (isClosed()) {
+ throw new IllegalStateException("Session is closed");
+ } else if (listener == null) {
+ throw new NullPointerException("listener must not be null");
+ } else if (mReader.getTerminal().getName().startsWith(
+ SecureElementService.UICC_TERMINAL)) {
+ return null;
+ } else if ((p2 != 0x00) && (p2 != 0x04) && (p2 != 0x08)
+ && (p2 != (byte) 0x0C)) {
+ throw new UnsupportedOperationException("p2 not supported: "
+ + String.format("%02x ", p2 & 0xFF));
+ }
+
+ String packageName = getPackageNameFromCallingUid(Binder.getCallingUid());
+ Channel channel = null;
+
+ try {
+ channel = mReader.getTerminal().openBasicChannel(this, aid, p2, listener,
+ packageName, Binder.getCallingPid());
+ } catch (IOException e) {
+ throw new ServiceSpecificException(SEService.IO_ERROR, e.getMessage());
+ } catch (NoSuchElementException e) {
+ throw new ServiceSpecificException(SEService.NO_SUCH_ELEMENT_ERROR, e.getMessage());
+ }
+
+ if (channel == null) {
+ Log.i(mTag, "OpenBasicChannel() - returning null");
+ return null;
+ }
+ Log.i(mTag, "Open basic channel success. Channel: "
+ + channel.getChannelNumber());
+
+ mChannels.add(channel);
+ return channel.new SecureElementChannel();
+ }
+
+ @Override
+ public ISecureElementChannel openLogicalChannel(byte[] aid, byte p2,
+ ISecureElementListener listener) throws RemoteException {
+ if (isClosed()) {
+ throw new IllegalStateException("Session is closed");
+ } else if (listener == null) {
+ throw new NullPointerException("listener must not be null");
+ } else if (((aid == null) || (aid.length == 0)) && mReader.getTerminal().getName()
+ .startsWith(SecureElementService.UICC_TERMINAL)) {
+ return null;
+ } else if ((p2 != 0x00) && (p2 != 0x04) && (p2 != 0x08)
+ && (p2 != (byte) 0x0C)) {
+ throw new UnsupportedOperationException("p2 not supported: "
+ + String.format("%02x ", p2 & 0xFF));
+ }
+
+ String packageName = getPackageNameFromCallingUid(Binder.getCallingUid());
+ Channel channel = null;
+
+ try {
+ channel = mReader.getTerminal().openLogicalChannel(this, aid, p2, listener,
+ packageName, Binder.getCallingPid());
+ } catch (IOException e) {
+ throw new ServiceSpecificException(SEService.IO_ERROR, e.getMessage());
+ } catch (NoSuchElementException e) {
+ throw new ServiceSpecificException(SEService.NO_SUCH_ELEMENT_ERROR, e.getMessage());
+ }
+
+ if (channel == null) {
+ Log.i(mTag, "openLogicalChannel() - returning null");
+ return null;
+ }
+ Log.i(mTag, "openLogicalChannel() Success. Channel: "
+ + channel.getChannelNumber());
+
+ mChannels.add(channel);
+ return channel.new SecureElementChannel();
+ }
+ }
+}