/****************************************************************************** * * Copyright 2023 NXP * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. * ******************************************************************************/ #include "SecureElement.h" #include #include "phNfcStatus.h" #include "phNxpEse_Apdu_Api.h" #include "phNxpEse_Api.h" /* Mutex to synchronize multiple transceive */ #include namespace aidl { namespace android { namespace hardware { namespace secure_element { #define DEFAULT_BASIC_CHANNEL 0x00 #define INVALID_LEN_SW1 0x64 #define INVALID_LEN_SW2 0xFF #define SW1_BYTES_REMAINING 0x61 #define NUM_OF_CH4 0x04 #define NUM_OF_CH5 0x05 typedef struct gsTransceiveBuffer { phNxpEse_data cmdData; phNxpEse_data rspData; std::vector* pRspDataBuff; } sTransceiveBuffer_t; static int getResponseInternal(uint8_t cla, phNxpEse_7816_rpdu_t& rpdu, std::vector& result); static sTransceiveBuffer_t gsTxRxBuffer; static std::vector gsRspDataBuff(256); std::shared_ptr SecureElement::mCb = nullptr; AIBinder_DeathRecipient* clientDeathRecipient = nullptr; std::vector SecureElement::mOpenedChannels; static const std::vector> kWeaverAIDs = { {0xA0, 0x00, 0x00, 0x03, 0x96, 0x10, 0x10}, // Primary AID {0xA0, 0x00, 0x00, 0x03, 0x96, 0x54, 0x53, 0x00, 0x00, 0x00, 0x01, 0x00, 0x23, 0x00, 0x00, 0x00}, // Alternate AID }; static bool isWeaverApplet(std::vector aid) { if (std::find(kWeaverAIDs.begin(), kWeaverAIDs.end(), aid) != kWeaverAIDs.end()) { return true; } return false; } SecureElement::SecureElement() : mMaxChannelCount(0), mOpenedchannelCount(0), mIsEseInitialized(false) {} void SecureElement::updateSeHalInitState(bool mstate) { mIsEseInitialized = mstate; } void OnDeath(void* cookie) { (void)cookie; LOG(ERROR) << " SecureElement serviceDied!!!"; SecureElement* se = static_cast(cookie); se->updateSeHalInitState(false); if (se->seHalDeInit() != SESTATUS_SUCCESS) { LOG(ERROR) << "SE Deinit not successful"; } } void SecureElement::NotifySeWaitExtension(phNxpEse_wtxState state) { if (state == WTX_ONGOING) { LOG(INFO) << "SecureElement::WTX ongoing"; } else if (state == WTX_END) { LOG(INFO) << "SecureElement::WTX ended"; } } ScopedAStatus SecureElement::init( const std::shared_ptr& clientCallback) { LOG(INFO) << __func__ << " callback: " << clientCallback.get(); if (!clientCallback) { return ScopedAStatus::fromExceptionCode(EX_NULL_POINTER); } mCb = clientCallback; ESESTATUS status = ESESTATUS_SUCCESS; bool mIsInitDone = false; phNxpEse_initParams initParams; gsTxRxBuffer.pRspDataBuff = &gsRspDataBuff; memset(&initParams, 0x00, sizeof(phNxpEse_initParams)); initParams.initMode = ESE_MODE_NORMAL; initParams.mediaType = ESE_PROTOCOL_MEDIA_SPI_APDU_GATE; initParams.fPtr_WtxNtf = SecureElement::NotifySeWaitExtension; if (clientCallback == nullptr) { return ScopedAStatus::ok(); } else { clientDeathRecipient = AIBinder_DeathRecipient_new(OnDeath); auto linkRet = AIBinder_linkToDeath(clientCallback->asBinder().get(), clientDeathRecipient, this /* cookie */); if (linkRet != STATUS_OK) { LOG(ERROR) << __func__ << ": linkToDeath failed: " << linkRet; // Just ignore the error. } } LOG(INFO) << "SecureElement::init called here"; if (mIsEseInitialized) { mCb->onStateChange(true, "NXP SE HAL init ok"); return ScopedAStatus::ok(); } phNxpEse_setWtxCountLimit(OsuHalExtn::getInstance().getOSUMaxWtxCount()); status = phNxpEse_open(initParams); if (status == ESESTATUS_SUCCESS || ESESTATUS_BUSY == status) { ESESTATUS initStatus = ESESTATUS_SUCCESS; ESESTATUS deInitStatus = ESESTATUS_SUCCESS; if (ESESTATUS_SUCCESS == phNxpEse_SetEndPoint_Cntxt(0)) { initStatus = phNxpEse_init(initParams); if (initStatus == ESESTATUS_SUCCESS) { if (GET_CHIP_OS_VERSION() < OS_VERSION_8_9) { /*update OS mode during first init*/ IS_OSU_MODE(OsuHalExtn::getInstance().INIT, 0); } if (ESESTATUS_SUCCESS == phNxpEse_ResetEndPoint_Cntxt(0)) { LOG(INFO) << "ESE SPI init complete!!!"; mIsInitDone = true; } deInitStatus = phNxpEse_deInit(); if (ESESTATUS_SUCCESS != deInitStatus) mIsInitDone = false; } } status = phNxpEse_close(deInitStatus); /*Enable terminal post recovery(i.e. close success) from transmit failure */ if (status == ESESTATUS_SUCCESS && (initStatus == ESESTATUS_TRANSCEIVE_FAILED || initStatus == ESESTATUS_FAILED)) { if (GET_CHIP_OS_VERSION() < OS_VERSION_8_9) IS_OSU_MODE(OsuHalExtn::getInstance().INIT, 0); mIsInitDone = true; } } phNxpEse_setWtxCountLimit(RESET_APP_WTX_COUNT); if (status == ESESTATUS_SUCCESS && mIsInitDone) { mHasPriorityAccess = phNxpEse_isPriorityAccessEnabled(); mMaxChannelCount = getMaxChannelCnt(); mOpenedChannels.resize(mMaxChannelCount, false); mCb->onStateChange(true, "NXP SE HAL init ok"); } else { LOG(ERROR) << "eSE-Hal Init failed"; mCb->onStateChange(false, "NXP SE HAL init failed"); } return ScopedAStatus::ok(); } ScopedAStatus SecureElement::getAtr(std::vector* _aidl_return) { LOG(INFO) << __func__; AutoMutex guard(seHalLock); LOG(ERROR) << "Processing ATR....."; phNxpEse_data atrData; std::vector response; ESESTATUS status = ESESTATUS_FAILED; bool mIsSeHalInitDone = false; // In dedicated mode getATR not allowed if ((GET_CHIP_OS_VERSION() < OS_VERSION_6_2) && (IS_OSU_MODE(OsuHalExtn::getInstance().GETATR))) { LOG(ERROR) << "%s: Not allowed in dedicated mode!!!" << __func__; *_aidl_return = response; return ndk::ScopedAStatus::ok(); } if (!mIsEseInitialized) { ESESTATUS status = seHalInit(); if (status != ESESTATUS_SUCCESS) { LOG(ERROR) << "%s: seHalInit Failed!!!" << __func__; *_aidl_return = response; /*Return with empty Vector*/ return ndk::ScopedAStatus::ok(); } else { mIsSeHalInitDone = true; } } status = phNxpEse_SetEndPoint_Cntxt(0); if (status != ESESTATUS_SUCCESS) { LOG(ERROR) << "phNxpEse_SetEndPoint_Cntxt failed"; } status = phNxpEse_getAtr(&atrData); if (status != ESESTATUS_SUCCESS) { LOG(ERROR) << "phNxpEse_getAtr failed"; *_aidl_return = response; /*Return with empty Vector*/ return ndk::ScopedAStatus::ok(); } else { response.resize(atrData.len); memcpy(&response[0], atrData.p_data, atrData.len); } status = phNxpEse_ResetEndPoint_Cntxt(0); if (status != ESESTATUS_SUCCESS) { LOG(ERROR) << "phNxpEse_ResetEndPoint_Cntxt failed"; } if (status != ESESTATUS_SUCCESS) { ALOGD("ATR Data[BytebyByte]=Look below for %d bytes", atrData.len); for (auto i = response.begin(); i != response.end(); ++i) ALOGI("0x%x\t", *i); } *_aidl_return = std::move(response); if (atrData.p_data != NULL) { phNxpEse_free(atrData.p_data); } if (mIsSeHalInitDone) { if (SESTATUS_SUCCESS != seHalDeInit()) LOG(ERROR) << "phNxpEse_getAtr seHalDeInit failed"; mIsEseInitialized = false; mIsSeHalInitDone = false; } return ndk::ScopedAStatus::ok(); } ScopedAStatus SecureElement::isCardPresent(bool* _aidl_return) { LOG(INFO) << __func__; *_aidl_return = true; return ScopedAStatus::ok(); } ScopedAStatus SecureElement::transmit(const std::vector& data, std::vector* _aidl_return) { AutoMutex guard(seHalLock); ESESTATUS status = ESESTATUS_FAILED; std::vector result; if (!mOpenedchannelCount) { // 0x69, 0x86 = COMMAND NOT ALLOWED uint8_t sw[2] = {0x69, 0x86}; result.resize(sizeof(sw)); memcpy(&result[0], sw, sizeof(sw)); return ScopedAStatus::fromServiceSpecificError(CHANNEL_NOT_AVAILABLE); } phNxpEse_memset(&gsTxRxBuffer.cmdData, 0x00, sizeof(phNxpEse_data)); phNxpEse_memset(&gsTxRxBuffer.rspData, 0x00, sizeof(phNxpEse_data)); gsTxRxBuffer.cmdData.len = (uint32_t)data.size(); gsTxRxBuffer.cmdData.p_data = (uint8_t*)phNxpEse_memalloc(data.size() * sizeof(uint8_t)); if (NULL == gsTxRxBuffer.cmdData.p_data) { LOG(ERROR) << "transmit failed to allocate the Memory!!!"; /*Return empty vec*/ *_aidl_return = result; return ScopedAStatus::ok(); } if (GET_CHIP_OS_VERSION() < OS_VERSION_8_9) { OsuHalExtn::OsuApduMode mode = IS_OSU_MODE( data, OsuHalExtn::getInstance().TRANSMIT, &gsTxRxBuffer.cmdData); if (mode == OsuHalExtn::getInstance().OSU_BLOCKED_MODE) { LOG(ERROR) << "Not allowed in dedicated mode!!!"; /*Return empty vec*/ *_aidl_return = result; return ScopedAStatus::ok(); } else if (mode == OsuHalExtn::getInstance().OSU_RST_MODE) { uint8_t sw[2] = {0x90, 0x00}; result.resize(sizeof(sw)); memcpy(&result[0], sw, sizeof(sw)); *_aidl_return = result; return ScopedAStatus::ok(); } } else { memcpy(gsTxRxBuffer.cmdData.p_data, data.data(), gsTxRxBuffer.cmdData.len); } LOG(INFO) << "Acquired lock for SPI"; status = phNxpEse_SetEndPoint_Cntxt(0); if (status != ESESTATUS_SUCCESS) { LOG(ERROR) << "phNxpEse_SetEndPoint_Cntxt failed!!!"; } status = phNxpEse_Transceive(&gsTxRxBuffer.cmdData, &gsTxRxBuffer.rspData); if (status == ESESTATUS_SUCCESS) { result.resize(gsTxRxBuffer.rspData.len); memcpy(&result[0], gsTxRxBuffer.rspData.p_data, gsTxRxBuffer.rspData.len); } else if (status == ESESTATUS_INVALID_RECEIVE_LENGTH) { uint8_t respBuf[] = {INVALID_LEN_SW1, INVALID_LEN_SW2}; result.resize(sizeof(respBuf)); memcpy(&result[0], respBuf, sizeof(respBuf)); } else { LOG(ERROR) << "transmit failed!!!"; } status = phNxpEse_ResetEndPoint_Cntxt(0); if (status != ESESTATUS_SUCCESS) { LOG(ERROR) << "phNxpEse_ResetEndPoint_Cntxt failed!!!"; } *_aidl_return = std::move(result); if (NULL != gsTxRxBuffer.cmdData.p_data) { phNxpEse_free(gsTxRxBuffer.cmdData.p_data); gsTxRxBuffer.cmdData.p_data = NULL; } if (NULL != gsTxRxBuffer.rspData.p_data) { phNxpEse_free(gsTxRxBuffer.rspData.p_data); gsTxRxBuffer.rspData.p_data = NULL; } return ScopedAStatus::ok(); } ScopedAStatus SecureElement::openLogicalChannel( const std::vector& aid, int8_t p2, ::aidl::android::hardware::secure_element::LogicalChannelResponse* _aidl_return) { AutoMutex guard(seHalLock); std::vector manageChannelCommand = {0x00, 0x70, 0x00, 0x00, 0x01}; LogicalChannelResponse resApduBuff; resApduBuff.channelNumber = 0xff; memset(&resApduBuff, 0x00, sizeof(resApduBuff)); if (aid.size() > MAX_AID_LENGTH) { LOG(ERROR) << "%s: AID out of range!!!" << __func__; *_aidl_return = resApduBuff; return ScopedAStatus::fromServiceSpecificError(FAILED); } /* * Basic channel & reserved channel if any is removed * from count */ uint8_t maxLogicalChannelSupported = mMaxChannelCount - getReserveChannelCnt(aid) - 1; uint8_t openedLogicalChannelCount = mOpenedchannelCount; if (mOpenedChannels[0]) openedLogicalChannelCount--; if (openedLogicalChannelCount >= maxLogicalChannelSupported) { ALOGE("%s: Reached Max supported(%d) Logical Channel", __func__, openedLogicalChannelCount); *_aidl_return = resApduBuff; return ScopedAStatus::fromServiceSpecificError(CHANNEL_NOT_AVAILABLE); } LOG(INFO) << "Acquired the lock from SPI openLogicalChannel"; // In dedicated mode openLogical not allowed if ((GET_CHIP_OS_VERSION() < OS_VERSION_8_9) && (IS_OSU_MODE(OsuHalExtn::getInstance().OPENLOGICAL))) { LOG(ERROR) << "%s: Not allowed in dedicated mode!!!" << __func__; *_aidl_return = resApduBuff; return ScopedAStatus::fromServiceSpecificError(IOERROR); } if (!mIsEseInitialized) { ESESTATUS status = seHalInit(); if (status != ESESTATUS_SUCCESS) { LOG(ERROR) << "%s: seHalInit Failed!!!" << __func__; *_aidl_return = resApduBuff; return ScopedAStatus::fromServiceSpecificError(IOERROR); } } if (mOpenedChannels.size() == 0x00) { mMaxChannelCount = getMaxChannelCnt(); mOpenedChannels.resize(mMaxChannelCount, false); } int sestatus = ISecureElement::IOERROR; ESESTATUS status = ESESTATUS_FAILED; phNxpEse_data cmdApdu; phNxpEse_data rspApdu; phNxpEse_memset(&cmdApdu, 0x00, sizeof(phNxpEse_data)); phNxpEse_memset(&rspApdu, 0x00, sizeof(phNxpEse_data)); cmdApdu.len = (uint32_t)manageChannelCommand.size(); cmdApdu.p_data = (uint8_t*)phNxpEse_memalloc(manageChannelCommand.size() * sizeof(uint8_t)); memcpy(cmdApdu.p_data, manageChannelCommand.data(), cmdApdu.len); status = phNxpEse_SetEndPoint_Cntxt(0); if (status != ESESTATUS_SUCCESS) { LOG(ERROR) << "phNxpEse_SetEndPoint_Cntxt failed!!!"; } status = phNxpEse_Transceive(&cmdApdu, &rspApdu); if (status != ESESTATUS_SUCCESS) { resApduBuff.channelNumber = 0xff; } else if (rspApdu.p_data[rspApdu.len - 2] == 0x6A && rspApdu.p_data[rspApdu.len - 1] == 0x81) { resApduBuff.channelNumber = 0xff; sestatus = ISecureElement::CHANNEL_NOT_AVAILABLE; } else if (rspApdu.p_data[rspApdu.len - 2] == 0x90 && rspApdu.p_data[rspApdu.len - 1] == 0x00) { resApduBuff.channelNumber = rspApdu.p_data[0]; mOpenedchannelCount++; mOpenedChannels[resApduBuff.channelNumber] = true; sestatus = SESTATUS_SUCCESS; } else if (((rspApdu.p_data[rspApdu.len - 2] == 0x6E) || (rspApdu.p_data[rspApdu.len - 2] == 0x6D)) && rspApdu.p_data[rspApdu.len - 1] == 0x00) { sestatus = ISecureElement::UNSUPPORTED_OPERATION; } /*Free the allocations*/ phNxpEse_free(cmdApdu.p_data); phNxpEse_free(rspApdu.p_data); if (sestatus != SESTATUS_SUCCESS) { if (mOpenedchannelCount == 0) { int deInitStatus = seHalDeInit(); if (deInitStatus != SESTATUS_SUCCESS) { LOG(INFO) << "seDeInit Failed"; } } /*If manageChannel is failed in any of above cases send the callback and return*/ status = phNxpEse_ResetEndPoint_Cntxt(0); if (status != ESESTATUS_SUCCESS) { LOG(ERROR) << "phNxpEse_ResetEndPoint_Cntxt failed!!!"; } *_aidl_return = resApduBuff; return ScopedAStatus::fromServiceSpecificError(sestatus); } LOG(INFO) << "openLogicalChannel Sending selectApdu"; sestatus = ISecureElement::IOERROR; status = ESESTATUS_FAILED; phNxpEse_7816_cpdu_t cpdu; phNxpEse_7816_rpdu_t rpdu; phNxpEse_memset(&cpdu, 0x00, sizeof(phNxpEse_7816_cpdu_t)); phNxpEse_memset(&rpdu, 0x00, sizeof(phNxpEse_7816_rpdu_t)); if ((resApduBuff.channelNumber > 0x03) && (resApduBuff.channelNumber < 0x14)) { /* update CLA byte according to GP spec Table 11-12*/ cpdu.cla = 0x40 + (resApduBuff.channelNumber - 4); /* Class of instruction */ } else if ((resApduBuff.channelNumber > 0x00) && (resApduBuff.channelNumber < 0x04)) { /* update CLA byte according to GP spec Table 11-11*/ cpdu.cla = resApduBuff.channelNumber; /* Class of instruction */ } else { ALOGE("%s: Invalid Channel no: %02x", __func__, resApduBuff.channelNumber); resApduBuff.channelNumber = 0xff; *_aidl_return = resApduBuff; return ScopedAStatus::fromServiceSpecificError(IOERROR); } cpdu.ins = 0xA4; /* Instruction code */ cpdu.p1 = 0x04; /* Instruction parameter 1 */ cpdu.p2 = p2; /* Instruction parameter 2 */ cpdu.lc = (uint16_t)aid.size(); cpdu.le_type = 0x01; cpdu.pdata = (uint8_t*)phNxpEse_memalloc(aid.size() * sizeof(uint8_t)); memcpy(cpdu.pdata, aid.data(), cpdu.lc); cpdu.le = 256; rpdu.len = 0x02; rpdu.pdata = (uint8_t*)phNxpEse_memalloc(cpdu.le * sizeof(uint8_t)); status = phNxpEse_7816_Transceive(&cpdu, &rpdu); if (status != ESESTATUS_SUCCESS) { /*Transceive failed*/ if (rpdu.len > 0 && (rpdu.sw1 == 0x64 && rpdu.sw2 == 0xFF)) { sestatus = ISecureElement::IOERROR; } else { sestatus = ISecureElement::FAILED; } } else { /*Status word to be passed as part of response So include additional length*/ uint16_t responseLen = rpdu.len + 2; resApduBuff.selectResponse.resize(responseLen); memcpy(&resApduBuff.selectResponse[0], rpdu.pdata, rpdu.len); resApduBuff.selectResponse[responseLen - 1] = rpdu.sw2; resApduBuff.selectResponse[responseLen - 2] = rpdu.sw1; if (rpdu.sw1 == SW1_BYTES_REMAINING) { sestatus = getResponseInternal(cpdu.cla, rpdu, resApduBuff.selectResponse); if (sestatus != SESTATUS_SUCCESS) { LOG(ERROR) << "%s: getResponseInternal Failed" << __func__; } } /*Status is success*/ if ((rpdu.sw1 == 0x90 && rpdu.sw2 == 0x00) || (rpdu.sw1 == 0x62) || (rpdu.sw1 == 0x63)) { sestatus = SESTATUS_SUCCESS; } /*AID provided doesn't match any applet on the secure element*/ else if ((rpdu.sw1 == 0x6A && rpdu.sw2 == 0x82) || (rpdu.sw1 == 0x69 && (rpdu.sw2 == 0x99 || rpdu.sw2 == 0x85))) { sestatus = ISecureElement::NO_SUCH_ELEMENT_ERROR; } /*Operation provided by the P2 parameter is not permitted by the applet.*/ else if (rpdu.sw1 == 0x6A && rpdu.sw2 == 0x86) { sestatus = ISecureElement::UNSUPPORTED_OPERATION; } else { sestatus = ISecureElement::FAILED; } } if (sestatus != SESTATUS_SUCCESS) { int closeChannelStatus = internalCloseChannel(resApduBuff.channelNumber); if (closeChannelStatus != SESTATUS_SUCCESS) { LOG(ERROR) << "%s: closeChannel Failed" << __func__; } else { resApduBuff.channelNumber = 0xff; } } status = phNxpEse_ResetEndPoint_Cntxt(0); if (status != ESESTATUS_SUCCESS) { LOG(ERROR) << "phNxpEse_ResetEndPoint_Cntxt failed!!!"; } *_aidl_return = std::move(resApduBuff); phNxpEse_free(cpdu.pdata); phNxpEse_free(rpdu.pdata); return sestatus == SESTATUS_SUCCESS ? ndk::ScopedAStatus::ok() : ndk::ScopedAStatus::fromServiceSpecificError(sestatus); } ScopedAStatus SecureElement::openBasicChannel( const std::vector& aid, int8_t p2, std::vector* _aidl_return) { std::vector result; if (aid.size() > MAX_AID_LENGTH) { LOG(ERROR) << "%s: AID out of range!!!" << __func__; *_aidl_return = result; return ScopedAStatus::fromServiceSpecificError(FAILED); } AutoMutex guard(seHalLock); ESESTATUS status = ESESTATUS_SUCCESS; phNxpEse_7816_cpdu_t cpdu; phNxpEse_7816_rpdu_t rpdu; std::vector ls_aid = {0xA0, 0x00, 0x00, 0x03, 0x96, 0x41, 0x4C, 0x41, 0x01, 0x43, 0x4F, 0x52, 0x01}; if (mOpenedChannels[0]) { LOG(ERROR) << "openBasicChannel failed, channel already in use"; *_aidl_return = result; return ScopedAStatus::fromServiceSpecificError(UNSUPPORTED_OPERATION); } LOG(ERROR) << "Acquired the lock in SPI openBasicChannel"; if ((GET_CHIP_OS_VERSION() < OS_VERSION_8_9) && IS_OSU_MODE(aid, OsuHalExtn::getInstance().OPENBASIC) == OsuHalExtn::OSU_PROP_MODE) { uint8_t sw[2] = {0x90, 0x00}; result.resize(sizeof(sw)); memcpy(&result[0], sw, 2); if (mIsEseInitialized) { /* Close existing sessions if any to start dedicated OSU Mode * with OSU specific settings in TZ/TEE */ if (seHalDeInit() != SESTATUS_SUCCESS) { LOG(INFO) << "seDeInit Failed"; *_aidl_return = result; return ScopedAStatus::fromServiceSpecificError(IOERROR); } } phNxpEse_setWtxCountLimit(OsuHalExtn::getInstance().getOSUMaxWtxCount()); ESESTATUS status = ESESTATUS_FAILED; uint8_t retry = 0; do { /*For Reset Recovery*/ status = seHalInit(); } while (status != ESESTATUS_SUCCESS && retry++ < 1); if (status != ESESTATUS_SUCCESS) { LOG(ERROR) << "%s: seHalInit Failed!!!" << __func__; phNxpEse_setWtxCountLimit(RESET_APP_WTX_COUNT); *_aidl_return = result; return ScopedAStatus::fromServiceSpecificError(IOERROR); } if (phNxpEse_doResetProtection(true) != ESESTATUS_SUCCESS) { LOG(ERROR) << "%s: Enable Reset Protection Failed!!!" << __func__; *_aidl_return = result; return ScopedAStatus::fromServiceSpecificError(FAILED); } else { mOpenedChannels[0] = true; mOpenedchannelCount++; *_aidl_return = result; return ScopedAStatus::ok(); } } if (!mIsEseInitialized) { ESESTATUS status = seHalInit(); if (status != ESESTATUS_SUCCESS) { LOG(ERROR) << "%s: seHalInit Failed!!!" << __func__; *_aidl_return = result; return ScopedAStatus::fromServiceSpecificError(IOERROR); } } if (GET_CHIP_OS_VERSION() < OS_VERSION_8_9) { phNxpEse_data atrData; if (phNxpEse_getAtr(&atrData) != ESESTATUS_SUCCESS) { LOG(ERROR) << "phNxpEse_getAtr failed"; } if (atrData.p_data != NULL) { phNxpEse_free(atrData.p_data); } if (phNxpEse_GetOsMode() == OSU_MODE) { if (mOpenedchannelCount == 0) { if (seHalDeInit() != SESTATUS_SUCCESS) { LOG(INFO) << "seDeInit Failed"; } } *_aidl_return = result; return ScopedAStatus::fromServiceSpecificError(IOERROR); } } if (mOpenedChannels.size() == 0x00) { mMaxChannelCount = getMaxChannelCnt(); mOpenedChannels.resize(mMaxChannelCount, false); } phNxpEse_memset(&cpdu, 0x00, sizeof(phNxpEse_7816_cpdu_t)); phNxpEse_memset(&rpdu, 0x00, sizeof(phNxpEse_7816_rpdu_t)); cpdu.cla = 0x00; /* Class of instruction */ cpdu.ins = 0xA4; /* Instruction code */ cpdu.p1 = 0x04; /* Instruction parameter 1 */ cpdu.p2 = p2; /* Instruction parameter 2 */ cpdu.lc = (uint16_t)aid.size(); cpdu.le_type = 0x01; cpdu.pdata = (uint8_t*)phNxpEse_memalloc(aid.size() * sizeof(uint8_t)); memcpy(cpdu.pdata, aid.data(), cpdu.lc); cpdu.le = 256; rpdu.len = 0x02; rpdu.pdata = (uint8_t*)phNxpEse_memalloc(cpdu.le * sizeof(uint8_t)); status = phNxpEse_SetEndPoint_Cntxt(0); if (status != ESESTATUS_SUCCESS) { LOG(ERROR) << "phNxpEse_SetEndPoint_Cntxt failed!!!"; } status = phNxpEse_7816_Transceive(&cpdu, &rpdu); int sestatus; sestatus = SESTATUS_SUCCESS; if (status != ESESTATUS_SUCCESS) { /* Transceive failed */ if (rpdu.len > 0 && (rpdu.sw1 == 0x64 && rpdu.sw2 == 0xFF)) { sestatus = ISecureElement::IOERROR; } else { sestatus = ISecureElement::FAILED; } } else { /*Status word to be passed as part of response So include additional length*/ uint16_t responseLen = rpdu.len + 2; result.resize(responseLen); memcpy(&result[0], rpdu.pdata, rpdu.len); result[responseLen - 1] = rpdu.sw2; result[responseLen - 2] = rpdu.sw1; if (rpdu.sw1 == SW1_BYTES_REMAINING) { sestatus = getResponseInternal(cpdu.cla, rpdu, result); if (sestatus != SESTATUS_SUCCESS) { LOG(ERROR) << "%s: getResponseInternal Failed " << __func__; } } /*Status is success*/ if (((rpdu.sw1 == 0x90) && (rpdu.sw2 == 0x00)) || (rpdu.sw1 == 0x62) || (rpdu.sw1 == 0x63)) { /*Set basic channel reference if it is not set */ if (!mOpenedChannels[0]) { mOpenedChannels[0] = true; mOpenedchannelCount++; } sestatus = SESTATUS_SUCCESS; } /*AID provided doesn't match any applet on the secure element*/ else if ((rpdu.sw1 == 0x6A && rpdu.sw2 == 0x82) || (rpdu.sw1 == 0x69 && (rpdu.sw2 == 0x99 || rpdu.sw2 == 0x85))) { sestatus = ISecureElement::NO_SUCH_ELEMENT_ERROR; } /*Operation provided by the P2 parameter is not permitted by the applet.*/ else if (rpdu.sw1 == 0x6A && rpdu.sw2 == 0x86) { sestatus = ISecureElement::UNSUPPORTED_OPERATION; } else { sestatus = ISecureElement::FAILED; } } status = phNxpEse_ResetEndPoint_Cntxt(0); if (status != ESESTATUS_SUCCESS) { LOG(ERROR) << "phNxpEse_ResetEndPoint_Cntxt failed!!!"; } if (sestatus != SESTATUS_SUCCESS) { int closeChannelStatus = internalCloseChannel(DEFAULT_BASIC_CHANNEL); if (closeChannelStatus != SESTATUS_SUCCESS) { LOG(ERROR) << "%s: closeChannel Failed" << __func__; } } *_aidl_return = std::move(result); phNxpEse_free(cpdu.pdata); phNxpEse_free(rpdu.pdata); return sestatus == SESTATUS_SUCCESS ? ndk::ScopedAStatus::ok() : ndk::ScopedAStatus::fromServiceSpecificError(sestatus); } int SecureElement::internalCloseChannel(uint8_t channelNumber) { ESESTATUS status = ESESTATUS_SUCCESS; int sestatus = ISecureElement::FAILED; phNxpEse_7816_cpdu_t cpdu; phNxpEse_7816_rpdu_t rpdu; LOG(ERROR) << "Acquired the lock in SPI internalCloseChannel"; ALOGD("mMaxChannelCount = %d, Closing Channel = %d", mMaxChannelCount, channelNumber); if (channelNumber >= mMaxChannelCount) { ALOGE("invalid channel!!! %d", channelNumber); } else if (channelNumber > DEFAULT_BASIC_CHANNEL && mOpenedChannels[channelNumber]) { phNxpEse_memset(&cpdu, 0x00, sizeof(phNxpEse_7816_cpdu_t)); phNxpEse_memset(&rpdu, 0x00, sizeof(phNxpEse_7816_rpdu_t)); cpdu.cla = channelNumber; /* Class of instruction */ // For Supplementary Channel update CLA byte according to GP if ((channelNumber > 0x03) && (channelNumber < 0x14)) { /* update CLA byte according to GP spec Table 11-12*/ cpdu.cla = 0x40 + (channelNumber - 4); /* Class of instruction */ } cpdu.ins = 0x70; /* Instruction code */ cpdu.p1 = 0x80; /* Instruction parameter 1 */ cpdu.p2 = channelNumber; /* Instruction parameter 2 */ cpdu.lc = 0x00; cpdu.le = 0x9000; status = phNxpEse_SetEndPoint_Cntxt(0); if (status != ESESTATUS_SUCCESS) { LOG(ERROR) << "phNxpEse_SetEndPoint_Cntxt failed!!!"; } status = phNxpEse_7816_Transceive(&cpdu, &rpdu); if (status == ESESTATUS_SUCCESS) { if ((rpdu.sw1 == 0x90) && (rpdu.sw2 == 0x00)) { sestatus = SESTATUS_SUCCESS; } } status = phNxpEse_ResetEndPoint_Cntxt(0); if (status != ESESTATUS_SUCCESS) { LOG(ERROR) << "phNxpEse_ResetEndPoint_Cntxt failed!!!"; } } else if (channelNumber == DEFAULT_BASIC_CHANNEL && mOpenedChannels[channelNumber]) { sestatus = SESTATUS_SUCCESS; } if (channelNumber < mMaxChannelCount) { if (mOpenedChannels[channelNumber]) { mOpenedChannels[channelNumber] = false; mOpenedchannelCount--; } } /*If there are no channels remaining close secureElement*/ if (mOpenedchannelCount == 0) { if (SESTATUS_SUCCESS != seHalDeInit()) { LOG(ERROR) << "internalCloseChannel seHalDeInit failed"; } } else { sestatus = SESTATUS_SUCCESS; } return sestatus; } ScopedAStatus SecureElement::closeChannel(int8_t channelNumber) { AutoMutex guard(seHalLock); int sestatus; // Close internal allowed when not in dedicated Mode if ((GET_CHIP_OS_VERSION() >= OS_VERSION_8_9) || (!IS_OSU_MODE(OsuHalExtn::getInstance().CLOSE, channelNumber))) { sestatus = internalCloseChannel(channelNumber); } else { /*Decrement channel count opened to * keep in sync with service */ if (channelNumber < mMaxChannelCount) { if (mOpenedChannels[channelNumber]) { mOpenedChannels[channelNumber] = false; mOpenedchannelCount--; } } sestatus = SESTATUS_SUCCESS; } return sestatus == SESTATUS_SUCCESS ? ndk::ScopedAStatus::ok() : ndk::ScopedAStatus::fromServiceSpecificError(sestatus); } ESESTATUS SecureElement::seHalInit() { ESESTATUS status = ESESTATUS_SUCCESS; phNxpEse_initParams initParams; ESESTATUS deInitStatus = ESESTATUS_SUCCESS; memset(&initParams, 0x00, sizeof(phNxpEse_initParams)); initParams.initMode = ESE_MODE_NORMAL; initParams.mediaType = ESE_PROTOCOL_MEDIA_SPI_APDU_GATE; initParams.fPtr_WtxNtf = SecureElement::NotifySeWaitExtension; status = phNxpEse_open(initParams); if (ESESTATUS_SUCCESS == status || ESESTATUS_BUSY == status) { if (ESESTATUS_SUCCESS == phNxpEse_SetEndPoint_Cntxt(0) && ESESTATUS_SUCCESS == (status = phNxpEse_init(initParams))) { if (ESESTATUS_SUCCESS == phNxpEse_ResetEndPoint_Cntxt(0)) { mIsEseInitialized = true; LOG(INFO) << "ESE SPI init complete!!!"; return ESESTATUS_SUCCESS; } } else { LOG(INFO) << "ESE SPI init NOT successful"; status = ESESTATUS_FAILED; } deInitStatus = phNxpEse_deInit(); if (phNxpEse_close(deInitStatus) != ESESTATUS_SUCCESS) { LOG(INFO) << "ESE close not successful"; status = ESESTATUS_FAILED; } mIsEseInitialized = false; } return status; } int SecureElement::seHalDeInit() { ESESTATUS status = ESESTATUS_SUCCESS; ESESTATUS deInitStatus = ESESTATUS_SUCCESS; bool mIsDeInitDone = true; int sestatus = ISecureElement::FAILED; status = phNxpEse_SetEndPoint_Cntxt(0); if (status != ESESTATUS_SUCCESS) { LOG(ERROR) << "phNxpEse_SetEndPoint_Cntxt failed!!!"; mIsDeInitDone = false; } deInitStatus = phNxpEse_deInit(); if (ESESTATUS_SUCCESS != deInitStatus) mIsDeInitDone = false; status = phNxpEse_ResetEndPoint_Cntxt(0); if (status != ESESTATUS_SUCCESS) { LOG(ERROR) << "phNxpEse_ResetEndPoint_Cntxt failed!!!"; mIsDeInitDone = false; } status = phNxpEse_close(deInitStatus); if (status == ESESTATUS_SUCCESS && mIsDeInitDone) { sestatus = SESTATUS_SUCCESS; } else { LOG(ERROR) << "seHalDeInit: Failed"; } mIsEseInitialized = false; for (uint8_t xx = 0; xx < mMaxChannelCount; xx++) { mOpenedChannels[xx] = false; } mOpenedchannelCount = 0; return sestatus; } ScopedAStatus SecureElement::reset() { LOG(INFO) << __func__; ESESTATUS status = ESESTATUS_SUCCESS; int sestatus = ISecureElement::FAILED; LOG(INFO) << __func__ << " Enter"; if (!mIsEseInitialized) { ESESTATUS status = seHalInit(); if (status != ESESTATUS_SUCCESS) { LOG(ERROR) << __func__ << " seHalInit Failed!!!"; } } if (status == ESESTATUS_SUCCESS) { mCb->onStateChange(false, "reset"); status = phNxpEse_reset(); if (status != ESESTATUS_SUCCESS) { LOG(ERROR) << __func__ << " SecureElement reset failed!!"; } else { sestatus = SESTATUS_SUCCESS; if (mOpenedChannels.size() == 0x00) { mMaxChannelCount = getMaxChannelCnt(); mOpenedChannels.resize(mMaxChannelCount, false); } for (uint8_t xx = 0; xx < mMaxChannelCount; xx++) { mOpenedChannels[xx] = false; } mOpenedchannelCount = 0; mCb->onStateChange(true, "reset"); } } LOG(ERROR) << __func__ << ": Exit"; return sestatus == SESTATUS_SUCCESS ? ndk::ScopedAStatus::ok() : ndk::ScopedAStatus::fromServiceSpecificError(sestatus); } static int getResponseInternal(uint8_t cla, phNxpEse_7816_rpdu_t& rpdu, std::vector& result) { int sestatus = SESTATUS_SUCCESS; ESESTATUS status = ESESTATUS_SUCCESS; phNxpEse_data cmdApdu; phNxpEse_data rspApdu; uint16_t responseLen = rpdu.len; // Response already copied uint8_t getRespLe = rpdu.sw2; // Response pending to receive uint8_t getResponse[5] = {0x00, 0xC0, 0x00, 0x00, 0x00}; getResponse[0] = cla; phNxpEse_memset(&cmdApdu, 0x00, sizeof(phNxpEse_data)); cmdApdu.len = (uint32_t)sizeof(getResponse); cmdApdu.p_data = getResponse; do { // update GET response 61 xx(Le) getResponse[4] = getRespLe; phNxpEse_memset(&rspApdu, 0x00, sizeof(phNxpEse_data)); status = phNxpEse_Transceive(&cmdApdu, &rspApdu); if (status != ESESTATUS_SUCCESS) { /*Transceive failed*/ if (rspApdu.len > 0 && (rspApdu.p_data[rspApdu.len - 2] == 0x64 && rspApdu.p_data[rspApdu.len - 1] == 0xFF)) { sestatus = ISecureElement::IOERROR; } else { sestatus = ISecureElement::FAILED; } break; } else { uint32_t respLen = rspApdu.len; // skip 2 bytes in case of 61xx SW again if (rspApdu.p_data[respLen - 2] == SW1_BYTES_REMAINING) { respLen -= 2; getRespLe = rspApdu.p_data[respLen - 1]; } // copy response chunk received result.resize(responseLen + respLen); memcpy(&result[responseLen], rspApdu.p_data, respLen); responseLen += respLen; } } while (rspApdu.p_data[rspApdu.len - 2] == SW1_BYTES_REMAINING); // Propagate SW as it is received from card if (sestatus == SESTATUS_SUCCESS) { rpdu.sw1 = rspApdu.p_data[rspApdu.len - 2]; rpdu.sw2 = rspApdu.p_data[rspApdu.len - 1]; } else { // Other Failure cases update failure SW:64FF rpdu.sw1 = INVALID_LEN_SW1; rpdu.sw2 = INVALID_LEN_SW2; } return sestatus; } uint8_t SecureElement::getReserveChannelCnt(const std::vector& aid) { const std::vector araAid = {0xA0, 0x00, 0x00, 0x01, 0x51, 0x41, 0x43, 0x4C, 0x00}; uint8_t reserveChannel = 0; // Check priority access enabled then only reserve channel if (mHasPriorityAccess && !isWeaverApplet(aid) && aid != araAid) { // Exclude basic channel reserveChannel = 1; } return reserveChannel; } uint8_t SecureElement::getMaxChannelCnt() { /* * 1) SN1xx max channel supported 4. * 2) SN220 up to v2 max channel supported 5 (If priority access) * otherwise 4 channel. * 3) SN220 v3 and higher shall be updated accordingly. */ uint8_t cnt = 0; if (GET_CHIP_OS_VERSION() < OS_VERSION_6_2) cnt = NUM_OF_CH4; else if (GET_CHIP_OS_VERSION() == OS_VERSION_6_2) cnt = (mHasPriorityAccess ? NUM_OF_CH5 : NUM_OF_CH4); else cnt = NUM_OF_CH5; return cnt; } } // namespace secure_element } // namespace hardware } // namespace android } // namespace aidl