ChooseLockGeneric.java revision 0fb158a685d753682afdcffb0b783be8e38e0f2b
1/*
2 * Copyright (C) 2010 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 *      http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17package com.android.settings;
18
19import android.app.Activity;
20import android.app.PendingIntent;
21import android.app.admin.DevicePolicyManager;
22import android.content.Context;
23import android.content.Intent;
24import android.os.Bundle;
25import android.preference.Preference;
26import android.preference.PreferenceActivity;
27import android.preference.PreferenceScreen;
28import android.security.KeyStore;
29import android.view.LayoutInflater;
30import android.view.View;
31import android.view.ViewGroup;
32import android.widget.ListView;
33
34import com.android.internal.widget.LockPatternUtils;
35
36public class ChooseLockGeneric extends PreferenceActivity {
37
38    @Override
39    public Intent getIntent() {
40        Intent modIntent = new Intent(super.getIntent());
41        modIntent.putExtra(EXTRA_SHOW_FRAGMENT, ChooseLockGenericFragment.class.getName());
42        modIntent.putExtra(EXTRA_NO_HEADERS, true);
43        return modIntent;
44    }
45
46    public static class ChooseLockGenericFragment extends SettingsPreferenceFragment {
47        private static final int MIN_PASSWORD_LENGTH = 4;
48        private static final String KEY_UNLOCK_BACKUP_INFO = "unlock_backup_info";
49        private static final String KEY_UNLOCK_SET_OFF = "unlock_set_off";
50        private static final String KEY_UNLOCK_SET_NONE = "unlock_set_none";
51        private static final String KEY_UNLOCK_SET_BIOMETRIC_WEAK = "unlock_set_biometric_weak";
52        private static final String KEY_UNLOCK_SET_PIN = "unlock_set_pin";
53        private static final String KEY_UNLOCK_SET_PASSWORD = "unlock_set_password";
54        private static final String KEY_UNLOCK_SET_PATTERN = "unlock_set_pattern";
55        private static final int CONFIRM_EXISTING_REQUEST = 100;
56        private static final int FALLBACK_REQUEST = 101;
57        private static final String PASSWORD_CONFIRMED = "password_confirmed";
58        private static final String CONFIRM_CREDENTIALS = "confirm_credentials";
59        public static final String MINIMUM_QUALITY_KEY = "minimum_quality";
60
61        private ChooseLockSettingsHelper mChooseLockSettingsHelper;
62        private DevicePolicyManager mDPM;
63        private KeyStore mKeyStore;
64        private boolean mPasswordConfirmed = false;
65
66        @Override
67        public void onCreate(Bundle savedInstanceState) {
68            super.onCreate(savedInstanceState);
69
70            mDPM = (DevicePolicyManager) getSystemService(Context.DEVICE_POLICY_SERVICE);
71            mKeyStore = KeyStore.getInstance();
72            mChooseLockSettingsHelper = new ChooseLockSettingsHelper(this.getActivity());
73
74            // Defaults to needing to confirm credentials
75            final boolean confirmCredentials = getActivity().getIntent()
76                .getBooleanExtra(CONFIRM_CREDENTIALS, true);
77            mPasswordConfirmed = !confirmCredentials;
78
79            if (savedInstanceState != null) {
80                mPasswordConfirmed = savedInstanceState.getBoolean(PASSWORD_CONFIRMED);
81            }
82
83            if (!mPasswordConfirmed) {
84                ChooseLockSettingsHelper helper =
85                        new ChooseLockSettingsHelper(this.getActivity(), this);
86                if (!helper.launchConfirmationActivity(CONFIRM_EXISTING_REQUEST, null, null)) {
87                    mPasswordConfirmed = true; // no password set, so no need to confirm
88                    updatePreferencesOrFinish();
89                }
90            } else {
91                updatePreferencesOrFinish();
92            }
93        }
94
95        @Override
96        public boolean onPreferenceTreeClick(PreferenceScreen preferenceScreen,
97                Preference preference) {
98            final String key = preference.getKey();
99            boolean handled = true;
100            if (KEY_UNLOCK_SET_OFF.equals(key)) {
101                updateUnlockMethodAndFinish(
102                        DevicePolicyManager.PASSWORD_QUALITY_UNSPECIFIED, true);
103            } else if (KEY_UNLOCK_SET_NONE.equals(key)) {
104                updateUnlockMethodAndFinish(
105                        DevicePolicyManager.PASSWORD_QUALITY_UNSPECIFIED, false);
106            } else if (KEY_UNLOCK_SET_BIOMETRIC_WEAK.equals(key)) {
107                updateUnlockMethodAndFinish(
108                        DevicePolicyManager.PASSWORD_QUALITY_BIOMETRIC_WEAK, false);
109            }else if (KEY_UNLOCK_SET_PATTERN.equals(key)) {
110                updateUnlockMethodAndFinish(
111                        DevicePolicyManager.PASSWORD_QUALITY_SOMETHING, false);
112            } else if (KEY_UNLOCK_SET_PIN.equals(key)) {
113                updateUnlockMethodAndFinish(
114                        DevicePolicyManager.PASSWORD_QUALITY_NUMERIC, false);
115            } else if (KEY_UNLOCK_SET_PASSWORD.equals(key)) {
116                updateUnlockMethodAndFinish(
117                        DevicePolicyManager.PASSWORD_QUALITY_ALPHABETIC, false);
118            } else {
119                handled = false;
120            }
121            return handled;
122        }
123
124        @Override
125        public View onCreateView(LayoutInflater inflater, ViewGroup container,
126                Bundle savedInstanceState) {
127            View v = super.onCreateView(inflater, container, savedInstanceState);
128            final boolean onlyShowFallback = getActivity().getIntent()
129                    .getBooleanExtra(LockPatternUtils.LOCKSCREEN_BIOMETRIC_WEAK_FALLBACK, false);
130            if (onlyShowFallback) {
131                View header = v.inflate(getActivity(),
132                        R.layout.weak_biometric_fallback_header, null);
133                ((ListView) v.findViewById(android.R.id.list)).addHeaderView(header, null, false);
134            }
135
136            return v;
137        }
138
139        @Override
140        public void onActivityResult(int requestCode, int resultCode, Intent data) {
141            super.onActivityResult(requestCode, resultCode, data);
142            if (requestCode == CONFIRM_EXISTING_REQUEST && resultCode == Activity.RESULT_OK) {
143                mPasswordConfirmed = true;
144                updatePreferencesOrFinish();
145            } else if(requestCode == FALLBACK_REQUEST) {
146                mChooseLockSettingsHelper.utils().deleteTempGallery();
147                getActivity().setResult(resultCode);
148                finish();
149            } else {
150                getActivity().setResult(Activity.RESULT_CANCELED);
151                finish();
152            }
153        }
154
155        @Override
156        public void onSaveInstanceState(Bundle outState) {
157            super.onSaveInstanceState(outState);
158            // Saved so we don't force user to re-enter their password if configuration changes
159            outState.putBoolean(PASSWORD_CONFIRMED, mPasswordConfirmed);
160        }
161
162        private void updatePreferencesOrFinish() {
163            Intent intent = getActivity().getIntent();
164            int quality = intent.getIntExtra(LockPatternUtils.PASSWORD_TYPE_KEY, -1);
165            if (quality == -1) {
166                // If caller didn't specify password quality, show UI and allow the user to choose.
167                quality = intent.getIntExtra(MINIMUM_QUALITY_KEY, -1);
168                quality = upgradeQuality(quality);
169                final PreferenceScreen prefScreen = getPreferenceScreen();
170                if (prefScreen != null) {
171                    prefScreen.removeAll();
172                }
173                addPreferencesFromResource(R.xml.security_settings_picker);
174                disableUnusablePreferences(quality);
175            } else {
176                updateUnlockMethodAndFinish(quality, false);
177            }
178        }
179
180        private int upgradeQuality(int quality) {
181            quality = upgradeQualityForDPM(quality);
182            quality = upgradeQualityForEncryption(quality);
183            quality = upgradeQualityForKeyStore(quality);
184            return quality;
185        }
186
187        private int upgradeQualityForDPM(int quality) {
188            // Compare min allowed password quality
189            int minQuality = mDPM.getPasswordQuality(null);
190            if (quality < minQuality) {
191                quality = minQuality;
192            }
193            return quality;
194        }
195
196        /**
197         * Mix in "encryption minimums" to any given quality value.  This prevents users
198         * from downgrading the pattern/pin/password to a level below the minimums.
199         *
200         * ASSUMPTION:  Setting quality is sufficient (e.g. minimum lengths will be set
201         * appropriately.)
202         */
203        private int upgradeQualityForEncryption(int quality) {
204            int encryptionStatus = mDPM.getStorageEncryptionStatus();
205            boolean encrypted = (encryptionStatus == DevicePolicyManager.ENCRYPTION_STATUS_ACTIVE)
206                    || (encryptionStatus == DevicePolicyManager.ENCRYPTION_STATUS_ACTIVATING);
207            if (encrypted) {
208                if (quality < CryptKeeperSettings.MIN_PASSWORD_QUALITY) {
209                    quality = CryptKeeperSettings.MIN_PASSWORD_QUALITY;
210                }
211            }
212            return quality;
213        }
214
215        private int upgradeQualityForKeyStore(int quality) {
216            if (!mKeyStore.isEmpty()) {
217                if (quality < CredentialStorage.MIN_PASSWORD_QUALITY) {
218                    quality = CredentialStorage.MIN_PASSWORD_QUALITY;
219                }
220            }
221            return quality;
222        }
223
224        /***
225         * Disables preferences that are less secure than required quality.
226         *
227         * @param quality the requested quality.
228         */
229        private void disableUnusablePreferences(final int quality) {
230            final PreferenceScreen entries = getPreferenceScreen();
231            final boolean onlyShowFallback = getActivity().getIntent()
232                    .getBooleanExtra(LockPatternUtils.LOCKSCREEN_BIOMETRIC_WEAK_FALLBACK, false);
233            final boolean weakBiometricAvailable =
234                    mChooseLockSettingsHelper.utils().isBiometricWeakInstalled();
235            for (int i = entries.getPreferenceCount() - 1; i >= 0; --i) {
236                Preference pref = entries.getPreference(i);
237                if (pref instanceof PreferenceScreen) {
238                    final String key = ((PreferenceScreen) pref).getKey();
239                    boolean enabled = true;
240                    boolean visible = true;
241                    if (KEY_UNLOCK_SET_OFF.equals(key)) {
242                        enabled = quality <= DevicePolicyManager.PASSWORD_QUALITY_UNSPECIFIED;
243                    } else if (KEY_UNLOCK_SET_NONE.equals(key)) {
244                        enabled = quality <= DevicePolicyManager.PASSWORD_QUALITY_UNSPECIFIED;
245                    } else if (KEY_UNLOCK_SET_BIOMETRIC_WEAK.equals(key)) {
246                        enabled = quality <= DevicePolicyManager.PASSWORD_QUALITY_BIOMETRIC_WEAK;
247                        visible = weakBiometricAvailable; // If not available, then don't show it.
248                    } else if (KEY_UNLOCK_SET_PATTERN.equals(key)) {
249                        enabled = quality <= DevicePolicyManager.PASSWORD_QUALITY_SOMETHING;
250                    } else if (KEY_UNLOCK_SET_PIN.equals(key)) {
251                        enabled = quality <= DevicePolicyManager.PASSWORD_QUALITY_NUMERIC;
252                    } else if (KEY_UNLOCK_SET_PASSWORD.equals(key)) {
253                        enabled = quality <= DevicePolicyManager.PASSWORD_QUALITY_COMPLEX;
254                    }
255                    if (!visible || (onlyShowFallback && !allowedForFallback(key))) {
256                        entries.removePreference(pref);
257                    } else if (!enabled) {
258                        pref.setSummary(R.string.unlock_set_unlock_disabled_summary);
259                        pref.setEnabled(false);
260                    }
261                }
262            }
263        }
264
265        /**
266         * Check whether the key is allowed for fallback (e.g. bio sensor). Returns true if it's
267         * supported as a backup.
268         *
269         * @param key
270         * @return true if allowed
271         */
272        private boolean allowedForFallback(String key) {
273            return KEY_UNLOCK_BACKUP_INFO.equals(key)  ||
274                    KEY_UNLOCK_SET_PATTERN.equals(key) || KEY_UNLOCK_SET_PIN.equals(key);
275        }
276
277        private Intent getBiometricSensorIntent(int quality) {
278            Intent fallBackIntent = new Intent().setClass(getActivity(), ChooseLockGeneric.class);
279            fallBackIntent.putExtra(LockPatternUtils.LOCKSCREEN_BIOMETRIC_WEAK_FALLBACK, true);
280            fallBackIntent.putExtra(CONFIRM_CREDENTIALS, false);
281            fallBackIntent.putExtra(EXTRA_SHOW_FRAGMENT_TITLE,
282                    R.string.backup_lock_settings_picker_title);
283            fallBackIntent.addFlags(Intent.FLAG_ACTIVITY_NEW_TASK);
284
285            Intent intent = new Intent().setClassName("com.android.facelock",
286                    "com.android.facelock.SetupFaceLock");
287            PendingIntent pending = PendingIntent.getActivity(getActivity(), 0, fallBackIntent, 0);
288            intent.putExtra("PendingIntent", pending);
289            return intent;
290        }
291
292        /**
293         * Invokes an activity to change the user's pattern, password or PIN based on given quality
294         * and minimum quality specified by DevicePolicyManager. If quality is
295         * {@link DevicePolicyManager#PASSWORD_QUALITY_UNSPECIFIED}, password is cleared.
296         *
297         * @param quality the desired quality. Ignored if DevicePolicyManager requires more security
298         * @param disabled whether or not to show LockScreen at all. Only meaningful when quality is
299         * {@link DevicePolicyManager#PASSWORD_QUALITY_UNSPECIFIED}
300         */
301        void updateUnlockMethodAndFinish(int quality, boolean disabled) {
302            // Sanity check. We should never get here without confirming user's existing password.
303            if (!mPasswordConfirmed) {
304                throw new IllegalStateException("Tried to update password without confirming it");
305            }
306
307            final boolean isFallback = getActivity().getIntent()
308                .getBooleanExtra(LockPatternUtils.LOCKSCREEN_BIOMETRIC_WEAK_FALLBACK, false);
309
310            quality = upgradeQuality(quality);
311
312            if (quality >= DevicePolicyManager.PASSWORD_QUALITY_NUMERIC) {
313                int minLength = mDPM.getPasswordMinimumLength(null);
314                if (minLength < MIN_PASSWORD_LENGTH) {
315                    minLength = MIN_PASSWORD_LENGTH;
316                }
317                final int maxLength = mDPM.getPasswordMaximumLength(quality);
318                Intent intent = new Intent().setClass(getActivity(), ChooseLockPassword.class);
319                intent.putExtra(LockPatternUtils.PASSWORD_TYPE_KEY, quality);
320                intent.putExtra(ChooseLockPassword.PASSWORD_MIN_KEY, minLength);
321                intent.putExtra(ChooseLockPassword.PASSWORD_MAX_KEY, maxLength);
322                intent.putExtra(CONFIRM_CREDENTIALS, false);
323                intent.putExtra(LockPatternUtils.LOCKSCREEN_BIOMETRIC_WEAK_FALLBACK,
324                        isFallback);
325                if(isFallback) {
326                    startActivityForResult(intent, FALLBACK_REQUEST);
327                    return;
328                }
329                else {
330                    intent.addFlags(Intent.FLAG_ACTIVITY_FORWARD_RESULT);
331                    startActivity(intent);
332                }
333            } else if (quality == DevicePolicyManager.PASSWORD_QUALITY_SOMETHING) {
334                boolean showTutorial = !mChooseLockSettingsHelper.utils().isPatternEverChosen();
335                Intent intent = new Intent();
336                intent.setClass(getActivity(), showTutorial
337                        ? ChooseLockPatternTutorial.class
338                        : ChooseLockPattern.class);
339                intent.putExtra("key_lock_method", "pattern");
340                intent.putExtra(CONFIRM_CREDENTIALS, false);
341                intent.putExtra(LockPatternUtils.LOCKSCREEN_BIOMETRIC_WEAK_FALLBACK,
342                        isFallback);
343                if(isFallback) {
344                    startActivityForResult(intent, FALLBACK_REQUEST);
345                    return;
346                }
347                else {
348                    intent.addFlags(Intent.FLAG_ACTIVITY_FORWARD_RESULT);
349                    startActivity(intent);
350                }
351            } else if (quality == DevicePolicyManager.PASSWORD_QUALITY_BIOMETRIC_WEAK) {
352                Intent intent = getBiometricSensorIntent(quality);
353                startActivity(intent);
354            } else if (quality == DevicePolicyManager.PASSWORD_QUALITY_UNSPECIFIED) {
355                mChooseLockSettingsHelper.utils().clearLock(false);
356                mChooseLockSettingsHelper.utils().setLockScreenDisabled(disabled);
357                getActivity().setResult(Activity.RESULT_OK);
358            }
359            finish();
360        }
361    }
362}
363