parent
650848675d
commit
b23aaf793d
@ -0,0 +1,5 @@ |
||||
FP_ROOT := $(call my-dir)
|
||||
|
||||
ifneq ($(TARGET_SEC_FP_HAL_VARIANT),) |
||||
include $(FP_ROOT)/$(TARGET_SEC_FP_HAL_VARIANT)/Android.mk |
||||
endif |
@ -0,0 +1,15 @@ |
||||
LOCAL_PATH := $(call my-dir)
|
||||
|
||||
include $(CLEAR_VARS) |
||||
|
||||
LOCAL_SRC_FILES := \
|
||||
fingerprint.c
|
||||
|
||||
LOCAL_SHARED_LIBRARIES := \
|
||||
libhardware liblog
|
||||
|
||||
LOCAL_MODULE_RELATIVE_PATH := hw
|
||||
LOCAL_MODULE := fingerprint.$(TARGET_BOARD_PLATFORM)
|
||||
LOCAL_MODULE_TAGS := optional
|
||||
|
||||
include $(BUILD_SHARED_LIBRARY) |
@ -0,0 +1,193 @@ |
||||
/*
|
||||
* Copyright (C) 2017 Jesse Chan, The LineageOS Project |
||||
* |
||||
* Licensed under the Apache License, Version 2.0 (the "License"); |
||||
* you may not use this file except in compliance with the License. |
||||
* You may obtain a copy of the License at |
||||
* |
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
* |
||||
* Unless required by applicable law or agreed to in writing, software |
||||
* distributed under the License is distributed on an "AS IS" BASIS, |
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
||||
* See the License for the specific language governing permissions and |
||||
* limitations under the License. |
||||
*/ |
||||
|
||||
#define LOG_TAG "SS Fingerprint HAL" |
||||
|
||||
#include <dlfcn.h> |
||||
#include <stdlib.h> |
||||
#include <errno.h> |
||||
|
||||
#include <cutils/log.h> |
||||
|
||||
#include <hardware/hardware.h> |
||||
#include <hardware/fingerprint.h> |
||||
#include <utils/threads.h> |
||||
|
||||
typedef struct { |
||||
void *libhandle; |
||||
int (*ss_fingerprint_close)(void); |
||||
uint64_t (*ss_fingerprint_pre_enroll)(void); |
||||
int (*ss_fingerprint_enroll)(const hw_auth_token_t *hat, uint32_t gid, uint32_t timeout_sec); |
||||
int (*ss_fingerprint_post_enroll)(void); |
||||
uint64_t (*ss_fingerprint_get_auth_id)(void); |
||||
int (*ss_fingerprint_remove)(uint32_t gid, uint32_t fid); |
||||
int (*ss_fingerprint_set_active_group)(uint32_t gid, const char *store_path); |
||||
int (*ss_fingerprint_authenticate)(uint64_t operation_id, uint32_t gid); |
||||
int (*ss_set_notify_callback)(fingerprint_notify_t notify); |
||||
int (*ss_fingerprint_cancel)(void); |
||||
int (*ss_fingerprint_open)(const char *id); |
||||
} bauth_server_handle_t; |
||||
|
||||
bauth_server_handle_t* bauth_handle; |
||||
|
||||
static int load_bauth_server(void) |
||||
{ |
||||
bauth_handle = (bauth_server_handle_t *)malloc(sizeof(bauth_server_handle_t)); |
||||
if (bauth_handle == NULL) |
||||
goto no_memory; |
||||
|
||||
void *libhandle = bauth_handle->libhandle; |
||||
|
||||
libhandle = dlopen("libbauthserver.so", RTLD_NOW); |
||||
bauth_handle->ss_fingerprint_close = dlsym(libhandle, "ss_fingerprint_close"); |
||||
bauth_handle->ss_fingerprint_pre_enroll = dlsym(libhandle, "ss_fingerprint_pre_enroll"); |
||||
bauth_handle->ss_fingerprint_enroll = dlsym(libhandle, "ss_fingerprint_enroll"); |
||||
bauth_handle->ss_fingerprint_post_enroll = dlsym(libhandle, "ss_fingerprint_post_enroll"); |
||||
bauth_handle->ss_fingerprint_get_auth_id = dlsym(libhandle, "ss_fingerprint_get_auth_id"); |
||||
bauth_handle->ss_fingerprint_remove = dlsym(libhandle, "ss_fingerprint_remove"); |
||||
bauth_handle->ss_fingerprint_set_active_group = dlsym(libhandle, "ss_fingerprint_set_active_group"); |
||||
bauth_handle->ss_fingerprint_authenticate = dlsym(libhandle, "ss_fingerprint_authenticate"); |
||||
bauth_handle->ss_set_notify_callback = dlsym(libhandle, "ss_set_notify_callback"); |
||||
bauth_handle->ss_fingerprint_cancel = dlsym(libhandle, "ss_fingerprint_cancel"); |
||||
bauth_handle->ss_fingerprint_open = dlsym(libhandle, "ss_fingerprint_open"); |
||||
|
||||
return 0; |
||||
|
||||
no_memory: |
||||
ALOGE("%s: not enough memory to load the libhandle", __func__); |
||||
return -ENOMEM; |
||||
} |
||||
|
||||
static int fingerprint_close(hw_device_t *dev) |
||||
{ |
||||
bauth_handle->ss_fingerprint_close(); |
||||
|
||||
if (dev) |
||||
free(dev); |
||||
|
||||
return 0; |
||||
} |
||||
|
||||
static uint64_t fingerprint_pre_enroll(struct fingerprint_device __unused *dev) |
||||
{ |
||||
return bauth_handle->ss_fingerprint_pre_enroll(); |
||||
} |
||||
|
||||
static int fingerprint_enroll(struct fingerprint_device __unused *dev, const hw_auth_token_t *hat, |
||||
uint32_t gid, uint32_t timeout_sec) |
||||
{ |
||||
return bauth_handle->ss_fingerprint_enroll(hat, gid, timeout_sec); |
||||
} |
||||
|
||||
static int fingerprint_post_enroll(struct fingerprint_device __unused *dev) |
||||
{ |
||||
return bauth_handle->ss_fingerprint_post_enroll(); |
||||
} |
||||
|
||||
static uint64_t fingerprint_get_auth_id(struct fingerprint_device __unused *dev) |
||||
{ |
||||
return bauth_handle->ss_fingerprint_get_auth_id(); |
||||
} |
||||
|
||||
static int fingerprint_cancel(struct fingerprint_device __unused *dev) |
||||
{ |
||||
return bauth_handle->ss_fingerprint_cancel(); |
||||
} |
||||
|
||||
static int fingerprint_remove(struct fingerprint_device __unused *dev, uint32_t gid, uint32_t fid) |
||||
{ |
||||
return bauth_handle->ss_fingerprint_remove(gid, fid); |
||||
} |
||||
|
||||
static int fingerprint_set_active_group(struct fingerprint_device __unused *dev, uint32_t gid, |
||||
const char *store_path) |
||||
{ |
||||
return bauth_handle->ss_fingerprint_set_active_group(gid, store_path); |
||||
} |
||||
|
||||
static int fingerprint_authenticate(struct fingerprint_device __unused *dev, uint64_t operation_id, |
||||
uint32_t gid) |
||||
{ |
||||
return bauth_handle->ss_fingerprint_authenticate(operation_id, gid); |
||||
} |
||||
|
||||
static int set_notify_callback(struct fingerprint_device *dev, fingerprint_notify_t notify) |
||||
{ |
||||
/* Decorate with locks */ |
||||
dev->notify = notify; |
||||
return bauth_handle->ss_set_notify_callback(notify); |
||||
} |
||||
|
||||
static int fingerprint_open(const hw_module_t* module, const char *id, hw_device_t** device) |
||||
{ |
||||
int ret; |
||||
fingerprint_device_t *dev = NULL; |
||||
|
||||
if (device == NULL) { |
||||
ALOGE("NULL device on open"); |
||||
ret = -ENODEV; |
||||
goto fail; |
||||
} |
||||
|
||||
ret = load_bauth_server(); |
||||
if (ret < 0) |
||||
goto fail; |
||||
|
||||
dev = (fingerprint_device_t*)calloc(1, sizeof(fingerprint_device_t)); |
||||
if (dev == NULL) { |
||||
ret = -ENOMEM; |
||||
goto fail; |
||||
} |
||||
|
||||
dev->common.tag = HARDWARE_DEVICE_TAG; |
||||
dev->common.version = FINGERPRINT_MODULE_API_VERSION_2_0; |
||||
dev->common.module = (struct hw_module_t*) module; |
||||
dev->common.close = fingerprint_close; |
||||
|
||||
dev->pre_enroll = fingerprint_pre_enroll; |
||||
dev->enroll = fingerprint_enroll; |
||||
dev->post_enroll = fingerprint_post_enroll; |
||||
dev->get_authenticator_id = fingerprint_get_auth_id; |
||||
dev->cancel = fingerprint_cancel; |
||||
dev->remove = fingerprint_remove; |
||||
dev->set_active_group = fingerprint_set_active_group; |
||||
dev->authenticate = fingerprint_authenticate; |
||||
dev->set_notify = set_notify_callback; |
||||
dev->notify = NULL; |
||||
|
||||
*device = (hw_device_t*) dev; |
||||
return (*bauth_handle->ss_fingerprint_open)(id); |
||||
|
||||
fail: |
||||
ALOGE("%s: failed to open FP device (ret=%d)", __func__, ret); |
||||
return ret; |
||||
} |
||||
|
||||
static struct hw_module_methods_t fingerprint_module_methods = { |
||||
.open = fingerprint_open, |
||||
}; |
||||
|
||||
fingerprint_module_t HAL_MODULE_INFO_SYM = { |
||||
.common = { |
||||
.tag = HARDWARE_MODULE_TAG, |
||||
.module_api_version = FINGERPRINT_MODULE_API_VERSION_2_0, |
||||
.hal_api_version = HARDWARE_HAL_API_VERSION, |
||||
.id = FINGERPRINT_HARDWARE_MODULE_ID, |
||||
.name = "Samsung TZ Fingerprint HAL", |
||||
.author = "The LineageOS Project", |
||||
.methods = &fingerprint_module_methods, |
||||
}, |
||||
}; |
Loading…
Reference in new issue