ChooseLockGeneric.java revision 0fb158a685d753682afdcffb0b783be8e38e0f2b
1/* 2 * Copyright (C) 2010 The Android Open Source Project 3 * 4 * Licensed under the Apache License, Version 2.0 (the "License"); 5 * you may not use this file except in compliance with the License. 6 * You may obtain a copy of the License at 7 * 8 * http://www.apache.org/licenses/LICENSE-2.0 9 * 10 * Unless required by applicable law or agreed to in writing, software 11 * distributed under the License is distributed on an "AS IS" BASIS, 12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 * See the License for the specific language governing permissions and 14 * limitations under the License. 15 */ 16 17package com.android.settings; 18 19import android.app.Activity; 20import android.app.PendingIntent; 21import android.app.admin.DevicePolicyManager; 22import android.content.Context; 23import android.content.Intent; 24import android.os.Bundle; 25import android.preference.Preference; 26import android.preference.PreferenceActivity; 27import android.preference.PreferenceScreen; 28import android.security.KeyStore; 29import android.view.LayoutInflater; 30import android.view.View; 31import android.view.ViewGroup; 32import android.widget.ListView; 33 34import com.android.internal.widget.LockPatternUtils; 35 36public class ChooseLockGeneric extends PreferenceActivity { 37 38 @Override 39 public Intent getIntent() { 40 Intent modIntent = new Intent(super.getIntent()); 41 modIntent.putExtra(EXTRA_SHOW_FRAGMENT, ChooseLockGenericFragment.class.getName()); 42 modIntent.putExtra(EXTRA_NO_HEADERS, true); 43 return modIntent; 44 } 45 46 public static class ChooseLockGenericFragment extends SettingsPreferenceFragment { 47 private static final int MIN_PASSWORD_LENGTH = 4; 48 private static final String KEY_UNLOCK_BACKUP_INFO = "unlock_backup_info"; 49 private static final String KEY_UNLOCK_SET_OFF = "unlock_set_off"; 50 private static final String KEY_UNLOCK_SET_NONE = "unlock_set_none"; 51 private static final String KEY_UNLOCK_SET_BIOMETRIC_WEAK = "unlock_set_biometric_weak"; 52 private static final String KEY_UNLOCK_SET_PIN = "unlock_set_pin"; 53 private static final String KEY_UNLOCK_SET_PASSWORD = "unlock_set_password"; 54 private static final String KEY_UNLOCK_SET_PATTERN = "unlock_set_pattern"; 55 private static final int CONFIRM_EXISTING_REQUEST = 100; 56 private static final int FALLBACK_REQUEST = 101; 57 private static final String PASSWORD_CONFIRMED = "password_confirmed"; 58 private static final String CONFIRM_CREDENTIALS = "confirm_credentials"; 59 public static final String MINIMUM_QUALITY_KEY = "minimum_quality"; 60 61 private ChooseLockSettingsHelper mChooseLockSettingsHelper; 62 private DevicePolicyManager mDPM; 63 private KeyStore mKeyStore; 64 private boolean mPasswordConfirmed = false; 65 66 @Override 67 public void onCreate(Bundle savedInstanceState) { 68 super.onCreate(savedInstanceState); 69 70 mDPM = (DevicePolicyManager) getSystemService(Context.DEVICE_POLICY_SERVICE); 71 mKeyStore = KeyStore.getInstance(); 72 mChooseLockSettingsHelper = new ChooseLockSettingsHelper(this.getActivity()); 73 74 // Defaults to needing to confirm credentials 75 final boolean confirmCredentials = getActivity().getIntent() 76 .getBooleanExtra(CONFIRM_CREDENTIALS, true); 77 mPasswordConfirmed = !confirmCredentials; 78 79 if (savedInstanceState != null) { 80 mPasswordConfirmed = savedInstanceState.getBoolean(PASSWORD_CONFIRMED); 81 } 82 83 if (!mPasswordConfirmed) { 84 ChooseLockSettingsHelper helper = 85 new ChooseLockSettingsHelper(this.getActivity(), this); 86 if (!helper.launchConfirmationActivity(CONFIRM_EXISTING_REQUEST, null, null)) { 87 mPasswordConfirmed = true; // no password set, so no need to confirm 88 updatePreferencesOrFinish(); 89 } 90 } else { 91 updatePreferencesOrFinish(); 92 } 93 } 94 95 @Override 96 public boolean onPreferenceTreeClick(PreferenceScreen preferenceScreen, 97 Preference preference) { 98 final String key = preference.getKey(); 99 boolean handled = true; 100 if (KEY_UNLOCK_SET_OFF.equals(key)) { 101 updateUnlockMethodAndFinish( 102 DevicePolicyManager.PASSWORD_QUALITY_UNSPECIFIED, true); 103 } else if (KEY_UNLOCK_SET_NONE.equals(key)) { 104 updateUnlockMethodAndFinish( 105 DevicePolicyManager.PASSWORD_QUALITY_UNSPECIFIED, false); 106 } else if (KEY_UNLOCK_SET_BIOMETRIC_WEAK.equals(key)) { 107 updateUnlockMethodAndFinish( 108 DevicePolicyManager.PASSWORD_QUALITY_BIOMETRIC_WEAK, false); 109 }else if (KEY_UNLOCK_SET_PATTERN.equals(key)) { 110 updateUnlockMethodAndFinish( 111 DevicePolicyManager.PASSWORD_QUALITY_SOMETHING, false); 112 } else if (KEY_UNLOCK_SET_PIN.equals(key)) { 113 updateUnlockMethodAndFinish( 114 DevicePolicyManager.PASSWORD_QUALITY_NUMERIC, false); 115 } else if (KEY_UNLOCK_SET_PASSWORD.equals(key)) { 116 updateUnlockMethodAndFinish( 117 DevicePolicyManager.PASSWORD_QUALITY_ALPHABETIC, false); 118 } else { 119 handled = false; 120 } 121 return handled; 122 } 123 124 @Override 125 public View onCreateView(LayoutInflater inflater, ViewGroup container, 126 Bundle savedInstanceState) { 127 View v = super.onCreateView(inflater, container, savedInstanceState); 128 final boolean onlyShowFallback = getActivity().getIntent() 129 .getBooleanExtra(LockPatternUtils.LOCKSCREEN_BIOMETRIC_WEAK_FALLBACK, false); 130 if (onlyShowFallback) { 131 View header = v.inflate(getActivity(), 132 R.layout.weak_biometric_fallback_header, null); 133 ((ListView) v.findViewById(android.R.id.list)).addHeaderView(header, null, false); 134 } 135 136 return v; 137 } 138 139 @Override 140 public void onActivityResult(int requestCode, int resultCode, Intent data) { 141 super.onActivityResult(requestCode, resultCode, data); 142 if (requestCode == CONFIRM_EXISTING_REQUEST && resultCode == Activity.RESULT_OK) { 143 mPasswordConfirmed = true; 144 updatePreferencesOrFinish(); 145 } else if(requestCode == FALLBACK_REQUEST) { 146 mChooseLockSettingsHelper.utils().deleteTempGallery(); 147 getActivity().setResult(resultCode); 148 finish(); 149 } else { 150 getActivity().setResult(Activity.RESULT_CANCELED); 151 finish(); 152 } 153 } 154 155 @Override 156 public void onSaveInstanceState(Bundle outState) { 157 super.onSaveInstanceState(outState); 158 // Saved so we don't force user to re-enter their password if configuration changes 159 outState.putBoolean(PASSWORD_CONFIRMED, mPasswordConfirmed); 160 } 161 162 private void updatePreferencesOrFinish() { 163 Intent intent = getActivity().getIntent(); 164 int quality = intent.getIntExtra(LockPatternUtils.PASSWORD_TYPE_KEY, -1); 165 if (quality == -1) { 166 // If caller didn't specify password quality, show UI and allow the user to choose. 167 quality = intent.getIntExtra(MINIMUM_QUALITY_KEY, -1); 168 quality = upgradeQuality(quality); 169 final PreferenceScreen prefScreen = getPreferenceScreen(); 170 if (prefScreen != null) { 171 prefScreen.removeAll(); 172 } 173 addPreferencesFromResource(R.xml.security_settings_picker); 174 disableUnusablePreferences(quality); 175 } else { 176 updateUnlockMethodAndFinish(quality, false); 177 } 178 } 179 180 private int upgradeQuality(int quality) { 181 quality = upgradeQualityForDPM(quality); 182 quality = upgradeQualityForEncryption(quality); 183 quality = upgradeQualityForKeyStore(quality); 184 return quality; 185 } 186 187 private int upgradeQualityForDPM(int quality) { 188 // Compare min allowed password quality 189 int minQuality = mDPM.getPasswordQuality(null); 190 if (quality < minQuality) { 191 quality = minQuality; 192 } 193 return quality; 194 } 195 196 /** 197 * Mix in "encryption minimums" to any given quality value. This prevents users 198 * from downgrading the pattern/pin/password to a level below the minimums. 199 * 200 * ASSUMPTION: Setting quality is sufficient (e.g. minimum lengths will be set 201 * appropriately.) 202 */ 203 private int upgradeQualityForEncryption(int quality) { 204 int encryptionStatus = mDPM.getStorageEncryptionStatus(); 205 boolean encrypted = (encryptionStatus == DevicePolicyManager.ENCRYPTION_STATUS_ACTIVE) 206 || (encryptionStatus == DevicePolicyManager.ENCRYPTION_STATUS_ACTIVATING); 207 if (encrypted) { 208 if (quality < CryptKeeperSettings.MIN_PASSWORD_QUALITY) { 209 quality = CryptKeeperSettings.MIN_PASSWORD_QUALITY; 210 } 211 } 212 return quality; 213 } 214 215 private int upgradeQualityForKeyStore(int quality) { 216 if (!mKeyStore.isEmpty()) { 217 if (quality < CredentialStorage.MIN_PASSWORD_QUALITY) { 218 quality = CredentialStorage.MIN_PASSWORD_QUALITY; 219 } 220 } 221 return quality; 222 } 223 224 /*** 225 * Disables preferences that are less secure than required quality. 226 * 227 * @param quality the requested quality. 228 */ 229 private void disableUnusablePreferences(final int quality) { 230 final PreferenceScreen entries = getPreferenceScreen(); 231 final boolean onlyShowFallback = getActivity().getIntent() 232 .getBooleanExtra(LockPatternUtils.LOCKSCREEN_BIOMETRIC_WEAK_FALLBACK, false); 233 final boolean weakBiometricAvailable = 234 mChooseLockSettingsHelper.utils().isBiometricWeakInstalled(); 235 for (int i = entries.getPreferenceCount() - 1; i >= 0; --i) { 236 Preference pref = entries.getPreference(i); 237 if (pref instanceof PreferenceScreen) { 238 final String key = ((PreferenceScreen) pref).getKey(); 239 boolean enabled = true; 240 boolean visible = true; 241 if (KEY_UNLOCK_SET_OFF.equals(key)) { 242 enabled = quality <= DevicePolicyManager.PASSWORD_QUALITY_UNSPECIFIED; 243 } else if (KEY_UNLOCK_SET_NONE.equals(key)) { 244 enabled = quality <= DevicePolicyManager.PASSWORD_QUALITY_UNSPECIFIED; 245 } else if (KEY_UNLOCK_SET_BIOMETRIC_WEAK.equals(key)) { 246 enabled = quality <= DevicePolicyManager.PASSWORD_QUALITY_BIOMETRIC_WEAK; 247 visible = weakBiometricAvailable; // If not available, then don't show it. 248 } else if (KEY_UNLOCK_SET_PATTERN.equals(key)) { 249 enabled = quality <= DevicePolicyManager.PASSWORD_QUALITY_SOMETHING; 250 } else if (KEY_UNLOCK_SET_PIN.equals(key)) { 251 enabled = quality <= DevicePolicyManager.PASSWORD_QUALITY_NUMERIC; 252 } else if (KEY_UNLOCK_SET_PASSWORD.equals(key)) { 253 enabled = quality <= DevicePolicyManager.PASSWORD_QUALITY_COMPLEX; 254 } 255 if (!visible || (onlyShowFallback && !allowedForFallback(key))) { 256 entries.removePreference(pref); 257 } else if (!enabled) { 258 pref.setSummary(R.string.unlock_set_unlock_disabled_summary); 259 pref.setEnabled(false); 260 } 261 } 262 } 263 } 264 265 /** 266 * Check whether the key is allowed for fallback (e.g. bio sensor). Returns true if it's 267 * supported as a backup. 268 * 269 * @param key 270 * @return true if allowed 271 */ 272 private boolean allowedForFallback(String key) { 273 return KEY_UNLOCK_BACKUP_INFO.equals(key) || 274 KEY_UNLOCK_SET_PATTERN.equals(key) || KEY_UNLOCK_SET_PIN.equals(key); 275 } 276 277 private Intent getBiometricSensorIntent(int quality) { 278 Intent fallBackIntent = new Intent().setClass(getActivity(), ChooseLockGeneric.class); 279 fallBackIntent.putExtra(LockPatternUtils.LOCKSCREEN_BIOMETRIC_WEAK_FALLBACK, true); 280 fallBackIntent.putExtra(CONFIRM_CREDENTIALS, false); 281 fallBackIntent.putExtra(EXTRA_SHOW_FRAGMENT_TITLE, 282 R.string.backup_lock_settings_picker_title); 283 fallBackIntent.addFlags(Intent.FLAG_ACTIVITY_NEW_TASK); 284 285 Intent intent = new Intent().setClassName("com.android.facelock", 286 "com.android.facelock.SetupFaceLock"); 287 PendingIntent pending = PendingIntent.getActivity(getActivity(), 0, fallBackIntent, 0); 288 intent.putExtra("PendingIntent", pending); 289 return intent; 290 } 291 292 /** 293 * Invokes an activity to change the user's pattern, password or PIN based on given quality 294 * and minimum quality specified by DevicePolicyManager. If quality is 295 * {@link DevicePolicyManager#PASSWORD_QUALITY_UNSPECIFIED}, password is cleared. 296 * 297 * @param quality the desired quality. Ignored if DevicePolicyManager requires more security 298 * @param disabled whether or not to show LockScreen at all. Only meaningful when quality is 299 * {@link DevicePolicyManager#PASSWORD_QUALITY_UNSPECIFIED} 300 */ 301 void updateUnlockMethodAndFinish(int quality, boolean disabled) { 302 // Sanity check. We should never get here without confirming user's existing password. 303 if (!mPasswordConfirmed) { 304 throw new IllegalStateException("Tried to update password without confirming it"); 305 } 306 307 final boolean isFallback = getActivity().getIntent() 308 .getBooleanExtra(LockPatternUtils.LOCKSCREEN_BIOMETRIC_WEAK_FALLBACK, false); 309 310 quality = upgradeQuality(quality); 311 312 if (quality >= DevicePolicyManager.PASSWORD_QUALITY_NUMERIC) { 313 int minLength = mDPM.getPasswordMinimumLength(null); 314 if (minLength < MIN_PASSWORD_LENGTH) { 315 minLength = MIN_PASSWORD_LENGTH; 316 } 317 final int maxLength = mDPM.getPasswordMaximumLength(quality); 318 Intent intent = new Intent().setClass(getActivity(), ChooseLockPassword.class); 319 intent.putExtra(LockPatternUtils.PASSWORD_TYPE_KEY, quality); 320 intent.putExtra(ChooseLockPassword.PASSWORD_MIN_KEY, minLength); 321 intent.putExtra(ChooseLockPassword.PASSWORD_MAX_KEY, maxLength); 322 intent.putExtra(CONFIRM_CREDENTIALS, false); 323 intent.putExtra(LockPatternUtils.LOCKSCREEN_BIOMETRIC_WEAK_FALLBACK, 324 isFallback); 325 if(isFallback) { 326 startActivityForResult(intent, FALLBACK_REQUEST); 327 return; 328 } 329 else { 330 intent.addFlags(Intent.FLAG_ACTIVITY_FORWARD_RESULT); 331 startActivity(intent); 332 } 333 } else if (quality == DevicePolicyManager.PASSWORD_QUALITY_SOMETHING) { 334 boolean showTutorial = !mChooseLockSettingsHelper.utils().isPatternEverChosen(); 335 Intent intent = new Intent(); 336 intent.setClass(getActivity(), showTutorial 337 ? ChooseLockPatternTutorial.class 338 : ChooseLockPattern.class); 339 intent.putExtra("key_lock_method", "pattern"); 340 intent.putExtra(CONFIRM_CREDENTIALS, false); 341 intent.putExtra(LockPatternUtils.LOCKSCREEN_BIOMETRIC_WEAK_FALLBACK, 342 isFallback); 343 if(isFallback) { 344 startActivityForResult(intent, FALLBACK_REQUEST); 345 return; 346 } 347 else { 348 intent.addFlags(Intent.FLAG_ACTIVITY_FORWARD_RESULT); 349 startActivity(intent); 350 } 351 } else if (quality == DevicePolicyManager.PASSWORD_QUALITY_BIOMETRIC_WEAK) { 352 Intent intent = getBiometricSensorIntent(quality); 353 startActivity(intent); 354 } else if (quality == DevicePolicyManager.PASSWORD_QUALITY_UNSPECIFIED) { 355 mChooseLockSettingsHelper.utils().clearLock(false); 356 mChooseLockSettingsHelper.utils().setLockScreenDisabled(disabled); 357 getActivity().setResult(Activity.RESULT_OK); 358 } 359 finish(); 360 } 361 } 362} 363