blob: e5925f07017fdfa168db35c6327f1a1c382ba1b8 [file] [log] [blame]
/*
* Copyright (C) 2014 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License
*/
package com.android.systemui.statusbar.phone;
import android.hardware.biometrics.BiometricSourceType;
import android.content.Context;
import android.os.Trace;
import com.android.internal.widget.LockPatternUtils;
import com.android.keyguard.KeyguardUpdateMonitor;
import com.android.keyguard.KeyguardUpdateMonitorCallback;
import java.util.ArrayList;
/**
* Caches whether the current unlock method is insecure, taking trust into account. This information
* might be a little bit out of date and should not be used for actual security decisions; it should
* be only used for visual indications.
*/
public class UnlockMethodCache {
private static UnlockMethodCache sInstance;
private final LockPatternUtils mLockPatternUtils;
private final KeyguardUpdateMonitor mKeyguardUpdateMonitor;
private final ArrayList<OnUnlockMethodChangedListener> mListeners = new ArrayList<>();
/** Whether the user configured a secure unlock method (PIN, password, etc.) */
private boolean mSecure;
/** Whether the unlock method is currently insecure (insecure method or trusted environment) */
private boolean mCanSkipBouncer;
private boolean mTrustManaged;
private boolean mFaceUnlockRunning;
private boolean mTrusted;
private UnlockMethodCache(Context ctx) {
mLockPatternUtils = new LockPatternUtils(ctx);
mKeyguardUpdateMonitor = KeyguardUpdateMonitor.getInstance(ctx);
KeyguardUpdateMonitor.getInstance(ctx).registerCallback(mCallback);
update(true /* updateAlways */);
}
public static UnlockMethodCache getInstance(Context context) {
if (sInstance == null) {
sInstance = new UnlockMethodCache(context);
}
return sInstance;
}
/**
* @return whether the user configured a secure unlock method like PIN, password, etc.
*/
public boolean isMethodSecure() {
return mSecure;
}
public boolean isTrusted() {
return mTrusted;
}
/**
* @return whether the lockscreen is currently insecure, and the bouncer won't be shown
*/
public boolean canSkipBouncer() {
return mCanSkipBouncer;
}
public void addListener(OnUnlockMethodChangedListener listener) {
mListeners.add(listener);
}
public void removeListener(OnUnlockMethodChangedListener listener) {
mListeners.remove(listener);
}
private void update(boolean updateAlways) {
Trace.beginSection("UnlockMethodCache#update");
int user = KeyguardUpdateMonitor.getCurrentUser();
boolean secure = mLockPatternUtils.isSecure(user);
boolean canSkipBouncer = !secure || mKeyguardUpdateMonitor.getUserCanSkipBouncer(user);
boolean trustManaged = mKeyguardUpdateMonitor.getUserTrustIsManaged(user);
boolean trusted = mKeyguardUpdateMonitor.getUserHasTrust(user);
boolean faceUnlockRunning = mKeyguardUpdateMonitor.isFaceUnlockRunning(user)
&& trustManaged;
boolean changed = secure != mSecure || canSkipBouncer != mCanSkipBouncer ||
trustManaged != mTrustManaged || faceUnlockRunning != mFaceUnlockRunning;
if (changed || updateAlways) {
mSecure = secure;
mCanSkipBouncer = canSkipBouncer;
mTrusted = trusted;
mTrustManaged = trustManaged;
mFaceUnlockRunning = faceUnlockRunning;
notifyListeners();
}
Trace.endSection();
}
private void notifyListeners() {
for (OnUnlockMethodChangedListener listener : mListeners) {
listener.onUnlockMethodStateChanged();
}
}
private final KeyguardUpdateMonitorCallback mCallback = new KeyguardUpdateMonitorCallback() {
@Override
public void onUserSwitchComplete(int userId) {
update(false /* updateAlways */);
}
@Override
public void onTrustChanged(int userId) {
update(false /* updateAlways */);
}
@Override
public void onTrustManagedChanged(int userId) {
update(false /* updateAlways */);
}
@Override
public void onStartedWakingUp() {
update(false /* updateAlways */);
}
@Override
public void onBiometricAuthenticated(int userId, BiometricSourceType biometricSourceType) {
Trace.beginSection("KeyguardUpdateMonitorCallback#onBiometricAuthenticated");
if (!mKeyguardUpdateMonitor.isUnlockingWithBiometricAllowed()) {
Trace.endSection();
return;
}
update(false /* updateAlways */);
Trace.endSection();
}
@Override
public void onFaceUnlockStateChanged(boolean running, int userId) {
update(false /* updateAlways */);
}
@Override
public void onStrongAuthStateChanged(int userId) {
update(false /* updateAlways */);
}
@Override
public void onScreenTurnedOff() {
update(false /* updateAlways */);
}
@Override
public void onKeyguardVisibilityChanged(boolean showing) {
update(false /* updateAlways */);
}
};
public boolean isTrustManaged() {
return mTrustManaged;
}
public boolean isFaceUnlockRunning() {
return mFaceUnlockRunning;
}
public static interface OnUnlockMethodChangedListener {
void onUnlockMethodStateChanged();
}
}