517 lines
18 KiB
C++
517 lines
18 KiB
C++
/*
|
|
* Copyright (C) 2022 The Android Open Source Project
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#include "FakeFingerprintEngine.h"
|
|
#include <regex>
|
|
#include "Fingerprint.h"
|
|
|
|
#include <android-base/logging.h>
|
|
#include <android-base/parseint.h>
|
|
|
|
#include <fingerprint.sysprop.h>
|
|
|
|
#include "util/CancellationSignal.h"
|
|
#include "util/Util.h"
|
|
|
|
using namespace ::android::fingerprint::virt;
|
|
using ::android::base::ParseInt;
|
|
|
|
namespace aidl::android::hardware::biometrics::fingerprint {
|
|
|
|
void FakeFingerprintEngine::generateChallengeImpl(ISessionCallback* cb) {
|
|
BEGIN_OP(0);
|
|
std::uniform_int_distribution<int64_t> dist;
|
|
auto challenge = dist(mRandom);
|
|
FingerprintHalProperties::challenge(challenge);
|
|
cb->onChallengeGenerated(challenge);
|
|
}
|
|
|
|
void FakeFingerprintEngine::revokeChallengeImpl(ISessionCallback* cb, int64_t challenge) {
|
|
BEGIN_OP(0);
|
|
FingerprintHalProperties::challenge({});
|
|
cb->onChallengeRevoked(challenge);
|
|
}
|
|
|
|
void FakeFingerprintEngine::enrollImpl(ISessionCallback* cb,
|
|
const keymaster::HardwareAuthToken& hat,
|
|
const std::future<void>& cancel) {
|
|
BEGIN_OP(getLatency(FingerprintHalProperties::operation_enroll_latency()));
|
|
|
|
// Do proper HAT verification in the real implementation.
|
|
if (hat.mac.empty()) {
|
|
LOG(ERROR) << "Fail: hat";
|
|
cb->onError(Error::UNABLE_TO_PROCESS, 0 /* vendorError */);
|
|
return;
|
|
}
|
|
|
|
// Force error-out
|
|
auto err = FingerprintHalProperties::operation_enroll_error().value_or(0);
|
|
if (err != 0) {
|
|
LOG(ERROR) << "Fail: operation_enroll_error";
|
|
auto ec = convertError(err);
|
|
cb->onError(ec.first, ec.second);
|
|
return;
|
|
}
|
|
|
|
// Format is "<id>:<progress_ms-[acquiredInfo..]>,...:<result>
|
|
auto nextEnroll = FingerprintHalProperties::next_enrollment().value_or("");
|
|
auto parts = Util::split(nextEnroll, ":");
|
|
if (parts.size() != 3) {
|
|
LOG(ERROR) << "Fail: invalid next_enrollment:" << nextEnroll;
|
|
cb->onError(Error::VENDOR, 0 /* vendorError */);
|
|
return;
|
|
}
|
|
auto enrollmentId = std::stoi(parts[0]);
|
|
auto progress = parseEnrollmentCapture(parts[1]);
|
|
for (size_t i = 0; i < progress.size(); i += 2) {
|
|
auto left = (progress.size() - i) / 2 - 1;
|
|
auto duration = progress[i][0];
|
|
auto acquired = progress[i + 1];
|
|
auto N = acquired.size();
|
|
|
|
for (int j = 0; j < N; j++) {
|
|
SLEEP_MS(duration / N);
|
|
|
|
if (shouldCancel(cancel)) {
|
|
LOG(ERROR) << "Fail: cancel";
|
|
cb->onError(Error::CANCELED, 0 /* vendorCode */);
|
|
return;
|
|
}
|
|
auto ac = convertAcquiredInfo(acquired[j]);
|
|
cb->onAcquired(ac.first, ac.second);
|
|
}
|
|
|
|
if (left == 0 && !IS_TRUE(parts[2])) { // end and failed
|
|
LOG(ERROR) << "Fail: requested by caller: " << nextEnroll;
|
|
FingerprintHalProperties::next_enrollment({});
|
|
cb->onError(Error::UNABLE_TO_PROCESS, 0 /* vendorCode */);
|
|
} else { // progress and update props if last time
|
|
LOG(INFO) << "onEnroll: " << enrollmentId << " left: " << left;
|
|
if (left == 0) {
|
|
auto enrollments = FingerprintHalProperties::enrollments();
|
|
enrollments.emplace_back(enrollmentId);
|
|
FingerprintHalProperties::enrollments(enrollments);
|
|
FingerprintHalProperties::next_enrollment({});
|
|
// change authenticatorId after new enrollment
|
|
auto id = FingerprintHalProperties::authenticator_id().value_or(0);
|
|
auto newId = id + 1;
|
|
FingerprintHalProperties::authenticator_id(newId);
|
|
LOG(INFO) << "Enrolled: " << enrollmentId;
|
|
}
|
|
cb->onEnrollmentProgress(enrollmentId, left);
|
|
}
|
|
}
|
|
}
|
|
|
|
void FakeFingerprintEngine::authenticateImpl(ISessionCallback* cb, int64_t /* operationId */,
|
|
const std::future<void>& cancel) {
|
|
BEGIN_OP(getLatency(FingerprintHalProperties::operation_authenticate_latency()));
|
|
|
|
int64_t now = Util::getSystemNanoTime();
|
|
int64_t duration = FingerprintHalProperties::operation_authenticate_duration().value_or(10);
|
|
auto acquired = FingerprintHalProperties::operation_authenticate_acquired().value_or("1");
|
|
auto acquiredInfos = parseIntSequence(acquired);
|
|
int N = acquiredInfos.size();
|
|
|
|
if (N == 0) {
|
|
LOG(ERROR) << "Fail to parse authentiate acquired info: " + acquired;
|
|
cb->onError(Error::UNABLE_TO_PROCESS, 0 /* vendorError */);
|
|
return;
|
|
}
|
|
|
|
// got lockout?
|
|
FakeLockoutTracker::LockoutMode lockoutMode = mLockoutTracker.getMode();
|
|
if (lockoutMode == FakeLockoutTracker::LockoutMode::kPermanent) {
|
|
LOG(ERROR) << "Fail: lockout permanent";
|
|
cb->onLockoutPermanent();
|
|
return;
|
|
} else if (lockoutMode == FakeLockoutTracker::LockoutMode::kTimed) {
|
|
int64_t timeLeft = mLockoutTracker.getLockoutTimeLeft();
|
|
LOG(ERROR) << "Fail: lockout timed " << timeLeft;
|
|
cb->onLockoutTimed(timeLeft);
|
|
}
|
|
|
|
int i = 0;
|
|
do {
|
|
if (FingerprintHalProperties::operation_authenticate_fails().value_or(false)) {
|
|
LOG(ERROR) << "Fail: operation_authenticate_fails";
|
|
mLockoutTracker.addFailedAttempt();
|
|
cb->onAuthenticationFailed();
|
|
return;
|
|
}
|
|
|
|
auto err = FingerprintHalProperties::operation_authenticate_error().value_or(0);
|
|
if (err != 0) {
|
|
LOG(ERROR) << "Fail: operation_authenticate_error";
|
|
auto ec = convertError(err);
|
|
cb->onError(ec.first, ec.second);
|
|
return;
|
|
}
|
|
|
|
if (FingerprintHalProperties::lockout().value_or(false)) {
|
|
LOG(ERROR) << "Fail: lockout";
|
|
cb->onLockoutPermanent();
|
|
cb->onError(Error::HW_UNAVAILABLE, 0 /* vendorError */);
|
|
return;
|
|
}
|
|
|
|
if (shouldCancel(cancel)) {
|
|
LOG(ERROR) << "Fail: cancel";
|
|
cb->onError(Error::CANCELED, 0 /* vendorCode */);
|
|
return;
|
|
}
|
|
|
|
if (i < N) {
|
|
auto ac = convertAcquiredInfo(acquiredInfos[i]);
|
|
cb->onAcquired(ac.first, ac.second);
|
|
i++;
|
|
}
|
|
|
|
SLEEP_MS(duration / N);
|
|
} while (!Util::hasElapsed(now, duration));
|
|
|
|
auto id = FingerprintHalProperties::enrollment_hit().value_or(0);
|
|
auto enrolls = FingerprintHalProperties::enrollments();
|
|
auto isEnrolled = std::find(enrolls.begin(), enrolls.end(), id) != enrolls.end();
|
|
if (id > 0 && isEnrolled) {
|
|
cb->onAuthenticationSucceeded(id, {} /* hat */);
|
|
mLockoutTracker.reset();
|
|
return;
|
|
} else {
|
|
LOG(ERROR) << "Fail: fingerprint not enrolled";
|
|
cb->onAuthenticationFailed();
|
|
mLockoutTracker.addFailedAttempt();
|
|
}
|
|
}
|
|
|
|
void FakeFingerprintEngine::detectInteractionImpl(ISessionCallback* cb,
|
|
const std::future<void>& cancel) {
|
|
BEGIN_OP(getLatency(FingerprintHalProperties::operation_detect_interaction_latency()));
|
|
|
|
int64_t duration =
|
|
FingerprintHalProperties::operation_detect_interaction_duration().value_or(10);
|
|
|
|
auto detectInteractionSupported =
|
|
FingerprintHalProperties::detect_interaction().value_or(false);
|
|
if (!detectInteractionSupported) {
|
|
LOG(ERROR) << "Detect interaction is not supported";
|
|
cb->onError(Error::UNABLE_TO_PROCESS, 0 /* vendorError */);
|
|
return;
|
|
}
|
|
|
|
auto acquired = FingerprintHalProperties::operation_detect_interaction_acquired().value_or("1");
|
|
auto acquiredInfos = parseIntSequence(acquired);
|
|
int N = acquiredInfos.size();
|
|
int64_t now = Util::getSystemNanoTime();
|
|
|
|
if (N == 0) {
|
|
LOG(ERROR) << "Fail to parse detect interaction acquired info: " + acquired;
|
|
cb->onError(Error::UNABLE_TO_PROCESS, 0 /* vendorError */);
|
|
return;
|
|
}
|
|
|
|
int i = 0;
|
|
do {
|
|
auto err = FingerprintHalProperties::operation_detect_interaction_error().value_or(0);
|
|
if (err != 0) {
|
|
LOG(ERROR) << "Fail: operation_detect_interaction_error";
|
|
auto ec = convertError(err);
|
|
cb->onError(ec.first, ec.second);
|
|
return;
|
|
}
|
|
|
|
if (shouldCancel(cancel)) {
|
|
LOG(ERROR) << "Fail: cancel";
|
|
cb->onError(Error::CANCELED, 0 /* vendorCode */);
|
|
return;
|
|
}
|
|
|
|
if (i < N) {
|
|
auto ac = convertAcquiredInfo(acquiredInfos[i]);
|
|
cb->onAcquired(ac.first, ac.second);
|
|
i++;
|
|
}
|
|
SLEEP_MS(duration / N);
|
|
} while (!Util::hasElapsed(now, duration));
|
|
|
|
auto id = FingerprintHalProperties::enrollment_hit().value_or(0);
|
|
auto enrolls = FingerprintHalProperties::enrollments();
|
|
auto isEnrolled = std::find(enrolls.begin(), enrolls.end(), id) != enrolls.end();
|
|
if (id <= 0 || !isEnrolled) {
|
|
LOG(ERROR) << "Fail: not enrolled";
|
|
cb->onError(Error::UNABLE_TO_PROCESS, 0 /* vendorError */);
|
|
return;
|
|
}
|
|
|
|
cb->onInteractionDetected();
|
|
}
|
|
|
|
void FakeFingerprintEngine::enumerateEnrollmentsImpl(ISessionCallback* cb) {
|
|
BEGIN_OP(0);
|
|
|
|
std::vector<int32_t> ids;
|
|
// There are some enrollment sync issue with framework, which results in
|
|
// a single template removal during the very firt sync command after reboot.
|
|
// This is a workaround for now. TODO(b/243129174)
|
|
ids.push_back(-1);
|
|
|
|
for (auto& enrollment : FingerprintHalProperties::enrollments()) {
|
|
auto id = enrollment.value_or(0);
|
|
if (id > 0) {
|
|
ids.push_back(id);
|
|
}
|
|
}
|
|
|
|
cb->onEnrollmentsEnumerated(ids);
|
|
}
|
|
|
|
void FakeFingerprintEngine::removeEnrollmentsImpl(ISessionCallback* cb,
|
|
const std::vector<int32_t>& enrollmentIds) {
|
|
BEGIN_OP(0);
|
|
|
|
std::vector<std::optional<int32_t>> newEnrollments;
|
|
std::vector<int32_t> removed;
|
|
for (auto& enrollment : FingerprintHalProperties::enrollments()) {
|
|
auto id = enrollment.value_or(0);
|
|
if (std::find(enrollmentIds.begin(), enrollmentIds.end(), id) != enrollmentIds.end()) {
|
|
removed.push_back(id);
|
|
} else if (id > 0) {
|
|
newEnrollments.emplace_back(id);
|
|
}
|
|
}
|
|
FingerprintHalProperties::enrollments(newEnrollments);
|
|
|
|
cb->onEnrollmentsRemoved(enrollmentIds);
|
|
}
|
|
|
|
void FakeFingerprintEngine::getAuthenticatorIdImpl(ISessionCallback* cb) {
|
|
BEGIN_OP(0);
|
|
int64_t authenticatorId;
|
|
if (FingerprintHalProperties::enrollments().size() == 0) {
|
|
authenticatorId = 0;
|
|
} else {
|
|
authenticatorId = FingerprintHalProperties::authenticator_id().value_or(0);
|
|
if (authenticatorId == 0) authenticatorId = 1;
|
|
}
|
|
cb->onAuthenticatorIdRetrieved(authenticatorId);
|
|
}
|
|
|
|
void FakeFingerprintEngine::invalidateAuthenticatorIdImpl(ISessionCallback* cb) {
|
|
BEGIN_OP(0);
|
|
int64_t newId;
|
|
if (FingerprintHalProperties::enrollments().size() == 0) {
|
|
newId = 0;
|
|
} else {
|
|
auto id = FingerprintHalProperties::authenticator_id().value_or(0);
|
|
newId = id + 1;
|
|
}
|
|
FingerprintHalProperties::authenticator_id(newId);
|
|
cb->onAuthenticatorIdInvalidated(newId);
|
|
}
|
|
|
|
void FakeFingerprintEngine::resetLockoutImpl(ISessionCallback* cb,
|
|
const keymaster::HardwareAuthToken& hat) {
|
|
BEGIN_OP(0);
|
|
if (hat.mac.empty()) {
|
|
LOG(ERROR) << "Fail: hat in resetLockout()";
|
|
cb->onError(Error::UNABLE_TO_PROCESS, 0 /* vendorError */);
|
|
return;
|
|
}
|
|
FingerprintHalProperties::lockout(false);
|
|
cb->onLockoutCleared();
|
|
mLockoutTracker.reset();
|
|
}
|
|
|
|
ndk::ScopedAStatus FakeFingerprintEngine::onPointerDownImpl(int32_t /*pointerId*/, int32_t /*x*/,
|
|
int32_t /*y*/, float /*minor*/,
|
|
float /*major*/) {
|
|
BEGIN_OP(0);
|
|
return ndk::ScopedAStatus::ok();
|
|
}
|
|
|
|
ndk::ScopedAStatus FakeFingerprintEngine::onPointerUpImpl(int32_t /*pointerId*/) {
|
|
BEGIN_OP(0);
|
|
return ndk::ScopedAStatus::ok();
|
|
}
|
|
|
|
ndk::ScopedAStatus FakeFingerprintEngine::onUiReadyImpl() {
|
|
BEGIN_OP(0);
|
|
return ndk::ScopedAStatus::ok();
|
|
}
|
|
|
|
bool FakeFingerprintEngine::getSensorLocationConfig(SensorLocation& out) {
|
|
auto loc = FingerprintHalProperties::sensor_location().value_or("");
|
|
auto isValidStr = false;
|
|
auto dim = Util::split(loc, ":");
|
|
|
|
if (dim.size() < 3 or dim.size() > 4) {
|
|
if (!loc.empty()) LOG(WARNING) << "Invalid sensor location input (x:y:radius):" + loc;
|
|
return false;
|
|
} else {
|
|
int32_t x, y, r;
|
|
std::string d = "";
|
|
if (dim.size() >= 3) {
|
|
isValidStr = ParseInt(dim[0], &x) && ParseInt(dim[1], &y) && ParseInt(dim[2], &r);
|
|
}
|
|
if (dim.size() >= 4) {
|
|
d = dim[3];
|
|
}
|
|
if (isValidStr) out = {0, x, y, r, d};
|
|
|
|
return isValidStr;
|
|
}
|
|
}
|
|
SensorLocation FakeFingerprintEngine::getSensorLocation() {
|
|
SensorLocation location;
|
|
|
|
if (getSensorLocationConfig(location)) {
|
|
return location;
|
|
} else {
|
|
return defaultSensorLocation();
|
|
}
|
|
}
|
|
|
|
SensorLocation FakeFingerprintEngine::defaultSensorLocation() {
|
|
return {0 /* displayId (not used) */, 0 /* sensorLocationX */, 0 /* sensorLocationY */,
|
|
0 /* sensorRadius */, "" /* display */};
|
|
}
|
|
|
|
std::vector<int32_t> FakeFingerprintEngine::parseIntSequence(const std::string& str,
|
|
const std::string& sep) {
|
|
std::vector<std::string> seqs = Util::split(str, sep);
|
|
std::vector<int32_t> res;
|
|
|
|
for (const auto& seq : seqs) {
|
|
int32_t val;
|
|
if (ParseInt(seq, &val)) {
|
|
res.push_back(val);
|
|
} else {
|
|
LOG(WARNING) << "Invalid int sequence:" + str;
|
|
res.clear();
|
|
break;
|
|
}
|
|
}
|
|
|
|
return res;
|
|
}
|
|
|
|
bool FakeFingerprintEngine::parseEnrollmentCaptureSingle(const std::string& str,
|
|
std::vector<std::vector<int32_t>>& res) {
|
|
std::vector<int32_t> defaultAcquiredInfo = {(int32_t)AcquiredInfo::GOOD};
|
|
bool aborted = true;
|
|
|
|
do {
|
|
std::smatch sms;
|
|
// Parses strings like "1000-[5,1]" or "500"
|
|
std::regex ex("((\\d+)(-\\[([\\d|,]+)\\])?)");
|
|
if (!regex_match(str.cbegin(), str.cend(), sms, ex)) break;
|
|
int32_t duration;
|
|
if (!ParseInt(sms.str(2), &duration)) break;
|
|
res.push_back({duration});
|
|
if (!sms.str(4).empty()) {
|
|
auto acqv = parseIntSequence(sms.str(4));
|
|
if (acqv.empty()) break;
|
|
res.push_back(acqv);
|
|
} else
|
|
res.push_back(defaultAcquiredInfo);
|
|
aborted = false;
|
|
} while (0);
|
|
|
|
return !aborted;
|
|
}
|
|
|
|
std::vector<std::vector<int32_t>> FakeFingerprintEngine::parseEnrollmentCapture(
|
|
const std::string& str) {
|
|
std::vector<std::vector<int32_t>> res;
|
|
|
|
std::string s(str);
|
|
s.erase(std::remove_if(s.begin(), s.end(), ::isspace), s.end());
|
|
bool aborted = false;
|
|
std::smatch sms;
|
|
// Parses strings like "1000-[5,1],500,800-[6,5,1]"
|
|
// ---------- --- -----------
|
|
// into parts: A B C
|
|
while (regex_search(s, sms, std::regex("^(,)?(\\d+(-\\[[\\d|,]+\\])?)"))) {
|
|
if (!parseEnrollmentCaptureSingle(sms.str(2), res)) {
|
|
aborted = true;
|
|
break;
|
|
}
|
|
s = sms.suffix();
|
|
}
|
|
if (aborted || s.length() != 0) {
|
|
res.clear();
|
|
LOG(ERROR) << "Failed to parse enrollment captures:" + str;
|
|
}
|
|
|
|
return res;
|
|
}
|
|
|
|
std::pair<AcquiredInfo, int32_t> FakeFingerprintEngine::convertAcquiredInfo(int32_t code) {
|
|
std::pair<AcquiredInfo, int32_t> res;
|
|
if (code > FINGERPRINT_ACQUIRED_VENDOR_BASE) {
|
|
res.first = AcquiredInfo::VENDOR;
|
|
res.second = code - FINGERPRINT_ACQUIRED_VENDOR_BASE;
|
|
} else {
|
|
res.first = (AcquiredInfo)code;
|
|
res.second = 0;
|
|
}
|
|
return res;
|
|
}
|
|
|
|
std::pair<Error, int32_t> FakeFingerprintEngine::convertError(int32_t code) {
|
|
std::pair<Error, int32_t> res;
|
|
if (code > FINGERPRINT_ERROR_VENDOR_BASE) {
|
|
res.first = Error::VENDOR;
|
|
res.second = code - FINGERPRINT_ERROR_VENDOR_BASE;
|
|
} else {
|
|
res.first = (Error)code;
|
|
res.second = 0;
|
|
}
|
|
return res;
|
|
}
|
|
|
|
int32_t FakeFingerprintEngine::getLatency(
|
|
const std::vector<std::optional<std::int32_t>>& latencyIn) {
|
|
int32_t res = DEFAULT_LATENCY;
|
|
|
|
std::vector<int32_t> latency;
|
|
for (auto x : latencyIn)
|
|
if (x.has_value()) latency.push_back(*x);
|
|
|
|
switch (latency.size()) {
|
|
case 0:
|
|
break;
|
|
case 1:
|
|
res = latency[0];
|
|
break;
|
|
case 2:
|
|
res = getRandomInRange(latency[0], latency[1]);
|
|
break;
|
|
default:
|
|
LOG(ERROR) << "ERROR: unexpected input of size " << latency.size();
|
|
break;
|
|
}
|
|
|
|
return res;
|
|
}
|
|
|
|
int32_t FakeFingerprintEngine::getRandomInRange(int32_t bound1, int32_t bound2) {
|
|
std::uniform_int_distribution<int32_t> dist(std::min(bound1, bound2), std::max(bound1, bound2));
|
|
return dist(mRandom);
|
|
}
|
|
|
|
} // namespace aidl::android::hardware::biometrics::fingerprint
|