blob: a71fcdbd9914f98114422ba541d45eec838acacd [file] [log] [blame]
/*
* Copyright (C) 2014 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License
*/
package com.android.systemui.statusbar.phone;
import android.content.BroadcastReceiver;
import android.content.Context;
import android.content.Intent;
import android.content.IntentFilter;
import android.hardware.biometrics.BiometricSourceType;
import android.os.Build;
import android.os.Trace;
import com.android.internal.widget.LockPatternUtils;
import com.android.keyguard.KeyguardUpdateMonitor;
import com.android.keyguard.KeyguardUpdateMonitorCallback;
import java.util.ArrayList;
/**
* Caches whether the current unlock method is insecure, taking trust into account. This information
* might be a little bit out of date and should not be used for actual security decisions; it should
* be only used for visual indications.
*/
public class UnlockMethodCache {
private static UnlockMethodCache sInstance;
private static final boolean DEBUG_AUTH_WITH_ADB = false;
private static final String AUTH_BROADCAST_KEY = "debug_trigger_auth";
private final LockPatternUtils mLockPatternUtils;
private final KeyguardUpdateMonitor mKeyguardUpdateMonitor;
private final ArrayList<OnUnlockMethodChangedListener> mListeners = new ArrayList<>();
/** Whether the user configured a secure unlock method (PIN, password, etc.) */
private boolean mSecure;
/** Whether the unlock method is currently insecure (insecure method or trusted environment) */
private boolean mCanSkipBouncer;
private boolean mTrustManaged;
private boolean mTrusted;
private boolean mDebugUnlocked = false;
private boolean mIsUnlockingWithFacePossible;
private UnlockMethodCache(Context ctx) {
mLockPatternUtils = new LockPatternUtils(ctx);
mKeyguardUpdateMonitor = KeyguardUpdateMonitor.getInstance(ctx);
KeyguardUpdateMonitor.getInstance(ctx).registerCallback(mCallback);
update(true /* updateAlways */);
if (Build.IS_DEBUGGABLE && DEBUG_AUTH_WITH_ADB) {
// Watch for interesting updates
final IntentFilter filter = new IntentFilter();
filter.addAction(AUTH_BROADCAST_KEY);
ctx.registerReceiver(new BroadcastReceiver() {
@Override
public void onReceive(Context context, Intent intent) {
if (DEBUG_AUTH_WITH_ADB && AUTH_BROADCAST_KEY.equals(intent.getAction())) {
mDebugUnlocked = !mDebugUnlocked;
update(true /* updateAlways */);
}
}
}, filter, null, null);
}
}
public static UnlockMethodCache getInstance(Context context) {
if (sInstance == null) {
sInstance = new UnlockMethodCache(context);
}
return sInstance;
}
/**
* @return whether the user configured a secure unlock method like PIN, password, etc.
*/
public boolean isMethodSecure() {
return mSecure;
}
public boolean isTrusted() {
return mTrusted;
}
/**
* @return whether the lockscreen is currently insecure, and the bouncer won't be shown
*/
public boolean canSkipBouncer() {
return mCanSkipBouncer;
}
public void addListener(OnUnlockMethodChangedListener listener) {
mListeners.add(listener);
}
public void removeListener(OnUnlockMethodChangedListener listener) {
mListeners.remove(listener);
}
/**
* If there are faces enrolled and user enabled face auth on keyguard.
*/
public boolean isUnlockingWithFacePossible() {
return mIsUnlockingWithFacePossible;
}
private void update(boolean updateAlways) {
Trace.beginSection("UnlockMethodCache#update");
int user = KeyguardUpdateMonitor.getCurrentUser();
boolean secure = mLockPatternUtils.isSecure(user);
boolean canSkipBouncer = !secure || mKeyguardUpdateMonitor.getUserCanSkipBouncer(user)
|| (Build.IS_DEBUGGABLE && DEBUG_AUTH_WITH_ADB && mDebugUnlocked);
boolean trustManaged = mKeyguardUpdateMonitor.getUserTrustIsManaged(user);
boolean trusted = mKeyguardUpdateMonitor.getUserHasTrust(user);
boolean isUnlockingWithFacePossible = mKeyguardUpdateMonitor.isUnlockWithFacePossible(user);
boolean changed = secure != mSecure || canSkipBouncer != mCanSkipBouncer
|| trustManaged != mTrustManaged
|| mIsUnlockingWithFacePossible != isUnlockingWithFacePossible;
if (changed || updateAlways) {
mSecure = secure;
mCanSkipBouncer = canSkipBouncer;
mTrusted = trusted;
mTrustManaged = trustManaged;
mIsUnlockingWithFacePossible = isUnlockingWithFacePossible;
notifyListeners();
}
Trace.endSection();
}
private void notifyListeners() {
for (OnUnlockMethodChangedListener listener : mListeners) {
listener.onUnlockMethodStateChanged();
}
}
private final KeyguardUpdateMonitorCallback mCallback = new KeyguardUpdateMonitorCallback() {
@Override
public void onUserSwitchComplete(int userId) {
update(false /* updateAlways */);
}
@Override
public void onTrustChanged(int userId) {
update(false /* updateAlways */);
}
@Override
public void onTrustManagedChanged(int userId) {
update(false /* updateAlways */);
}
@Override
public void onStartedWakingUp() {
update(false /* updateAlways */);
}
@Override
public void onBiometricAuthenticated(int userId, BiometricSourceType biometricSourceType) {
Trace.beginSection("KeyguardUpdateMonitorCallback#onBiometricAuthenticated");
if (!mKeyguardUpdateMonitor.isUnlockingWithBiometricAllowed()) {
Trace.endSection();
return;
}
update(false /* updateAlways */);
Trace.endSection();
}
@Override
public void onFaceUnlockStateChanged(boolean running, int userId) {
update(false /* updateAlways */);
}
@Override
public void onStrongAuthStateChanged(int userId) {
update(false /* updateAlways */);
}
@Override
public void onScreenTurnedOff() {
update(false /* updateAlways */);
}
@Override
public void onKeyguardVisibilityChanged(boolean showing) {
update(false /* updateAlways */);
}
@Override
public void onBiometricsCleared() {
update(false /* alwaysUpdate */);
}
};
public boolean isTrustManaged() {
return mTrustManaged;
}
public static interface OnUnlockMethodChangedListener {
void onUnlockMethodStateChanged();
}
}