blob: 8968de4d4962757912a923c9df83d63eff2ec4a2 [file] [log] [blame]
Jason parks8fd5bc92011-01-12 16:03:31 -06001/*
2 * Copyright (C) 2011 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17package com.android.settings;
18
Jason parks8fd5bc92011-01-12 16:03:31 -060019import android.app.Activity;
20import android.app.StatusBarManager;
21import android.content.ComponentName;
22import android.content.Context;
Jason parksec5a45e2011-01-18 15:28:36 -060023import android.content.Intent;
Jason parks8fd5bc92011-01-12 16:03:31 -060024import android.content.pm.PackageManager;
Jason parks06c5ff42011-03-01 10:17:40 -060025import android.os.AsyncTask;
Jason parks8fd5bc92011-01-12 16:03:31 -060026import android.os.Bundle;
Jason parksec5a45e2011-01-18 15:28:36 -060027import android.os.Handler;
Jason parks8fd5bc92011-01-12 16:03:31 -060028import android.os.IBinder;
Jason parksec5a45e2011-01-18 15:28:36 -060029import android.os.Message;
Jason parks35933812011-01-21 15:48:20 -060030import android.os.PowerManager;
David Brown8373b452011-06-20 12:38:45 -070031import android.os.RemoteException;
Jason parks8fd5bc92011-01-12 16:03:31 -060032import android.os.ServiceManager;
33import android.os.SystemProperties;
34import android.os.storage.IMountService;
David Brown8373b452011-06-20 12:38:45 -070035import android.telephony.TelephonyManager;
Jason parksec5a45e2011-01-18 15:28:36 -060036import android.text.TextUtils;
Jason parks8fd5bc92011-01-12 16:03:31 -060037import android.util.Log;
38import android.view.KeyEvent;
Andy Stadler13d62042011-01-31 19:21:37 -080039import android.view.View;
40import android.view.View.OnClickListener;
Jason parks8fd5bc92011-01-12 16:03:31 -060041import android.view.inputmethod.EditorInfo;
Ben Komalo9fcb6a72011-08-26 14:40:18 -070042import android.view.inputmethod.InputMethodInfo;
Jason parks75c085e2011-02-10 14:03:47 -060043import android.view.inputmethod.InputMethodManager;
Ben Komalo9fcb6a72011-08-26 14:40:18 -070044import android.view.inputmethod.InputMethodSubtype;
Andy Stadler13d62042011-01-31 19:21:37 -080045import android.widget.Button;
Jason parksec5a45e2011-01-18 15:28:36 -060046import android.widget.EditText;
47import android.widget.ProgressBar;
Jason parks8fd5bc92011-01-12 16:03:31 -060048import android.widget.TextView;
49
Ben Komalo91a2f052011-08-16 17:48:25 -070050import com.android.internal.telephony.ITelephony;
Ben Komalo9fcb6a72011-08-26 14:40:18 -070051
52import java.util.List;
Ben Komalo91a2f052011-08-16 17:48:25 -070053
54/**
55 * Settings screens to show the UI flows for encrypting/decrypting the device.
56 *
57 * This may be started via adb for debugging the UI layout, without having to go through
58 * encryption flows everytime. It should be noted that starting the activity in this manner
59 * is only useful for verifying UI-correctness - the behavior will not be identical.
60 * <pre>
61 * $ adb shell pm enable com.android.settings/.CryptKeeper
62 * $ adb shell am start \
63 * -e "com.android.settings.CryptKeeper.DEBUG_FORCE_VIEW" "progress" \
64 * -n com.android.settings/.CryptKeeper
65 * </pre>
66 */
Jason parks8fd5bc92011-01-12 16:03:31 -060067public class CryptKeeper extends Activity implements TextView.OnEditorActionListener {
Jason parksec5a45e2011-01-18 15:28:36 -060068 private static final String TAG = "CryptKeeper";
Jason parks35933812011-01-21 15:48:20 -060069
Jason parks8fd5bc92011-01-12 16:03:31 -060070 private static final String DECRYPT_STATE = "trigger_restart_framework";
Jason parksec5a45e2011-01-18 15:28:36 -060071
72 private static final int UPDATE_PROGRESS = 1;
73 private static final int COOLDOWN = 2;
74
75 private static final int MAX_FAILED_ATTEMPTS = 30;
76 private static final int COOL_DOWN_ATTEMPTS = 10;
77 private static final int COOL_DOWN_INTERVAL = 30; // 30 seconds
78
David Brown8373b452011-06-20 12:38:45 -070079 // Intent action for launching the Emergency Dialer activity.
80 static final String ACTION_EMERGENCY_DIAL = "com.android.phone.EmergencyDialer.DIAL";
81
Ben Komalo91a2f052011-08-16 17:48:25 -070082 // Debug Intent extras so that this Activity may be started via adb for debugging UI layouts
83 private static final String EXTRA_FORCE_VIEW =
84 "com.android.settings.CryptKeeper.DEBUG_FORCE_VIEW";
85 private static final String FORCE_VIEW_PROGRESS = "progress";
86 private static final String FORCE_VIEW_ENTRY = "entry";
87 private static final String FORCE_VIEW_ERROR = "error";
88
Ben Komalo0e666092011-09-01 15:42:00 -070089 /** When encryption is detected, this flag indivates whether or not we've checked for erros. */
90 private boolean mValidationComplete;
Ben Komalod4758ef2011-09-08 14:36:08 -070091 private boolean mValidationRequested;
Ben Komalo0e666092011-09-01 15:42:00 -070092 /** A flag to indicate that the volume is in a bad state (e.g. partially encrypted). */
93 private boolean mEncryptionGoneBad;
94
Andy Stadler14997402011-02-01 15:34:59 -080095 private int mCooldown;
96 PowerManager.WakeLock mWakeLock;
Jason parks06c5ff42011-03-01 10:17:40 -060097 private EditText mPasswordEntry;
Andy Stadler14997402011-02-01 15:34:59 -080098
99 /**
100 * Used to propagate state through configuration changes (e.g. screen rotation)
101 */
102 private static class NonConfigurationInstanceState {
103 final PowerManager.WakeLock wakelock;
104
105 NonConfigurationInstanceState(PowerManager.WakeLock _wakelock) {
106 wakelock = _wakelock;
107 }
108 }
109
Jason parksf1dbf552011-01-24 16:19:28 -0600110 // This activity is used to fade the screen to black after the password is entered.
111 public static class Blank extends Activity {
Andy Stadler13d62042011-01-31 19:21:37 -0800112 @Override
113 public void onCreate(Bundle savedInstanceState) {
114 super.onCreate(savedInstanceState);
115 setContentView(R.layout.crypt_keeper_blank);
116 }
Jason parksf1dbf552011-01-24 16:19:28 -0600117 }
Jason parksec5a45e2011-01-18 15:28:36 -0600118
Jason parks06c5ff42011-03-01 10:17:40 -0600119 private class DecryptTask extends AsyncTask<String, Void, Integer> {
120 @Override
121 protected Integer doInBackground(String... params) {
122 IMountService service = getMountService();
123 try {
124 return service.decryptStorage(params[0]);
125 } catch (Exception e) {
126 Log.e(TAG, "Error while decrypting...", e);
127 return -1;
128 }
129 }
130
131 @Override
132 protected void onPostExecute(Integer failedAttempts) {
133 if (failedAttempts == 0) {
134 // The password was entered successfully. Start the Blank activity
135 // so this activity animates to black before the devices starts. Note
136 // It has 1 second to complete the animation or it will be frozen
137 // until the boot animation comes back up.
138 Intent intent = new Intent(CryptKeeper.this, Blank.class);
139 finish();
140 startActivity(intent);
141 } else if (failedAttempts == MAX_FAILED_ATTEMPTS) {
142 // Factory reset the device.
143 sendBroadcast(new Intent("android.intent.action.MASTER_CLEAR"));
144 } else if ((failedAttempts % COOL_DOWN_ATTEMPTS) == 0) {
145 mCooldown = COOL_DOWN_INTERVAL;
146 cooldown();
147 } else {
148 TextView tv = (TextView) findViewById(R.id.status);
149 tv.setText(R.string.try_again);
150 tv.setVisibility(View.VISIBLE);
151
152 // Reenable the password entry
153 mPasswordEntry.setEnabled(true);
154 }
155 }
156 }
Jason parks75c085e2011-02-10 14:03:47 -0600157
Ben Komalo0e666092011-09-01 15:42:00 -0700158 private class ValidationTask extends AsyncTask<Void, Void, Boolean> {
159 @Override
160 protected Boolean doInBackground(Void... params) {
161 IMountService service = getMountService();
162 try {
Ben Komalod4758ef2011-09-08 14:36:08 -0700163 Log.d(TAG, "Validating encryption state.");
Ben Komalo0e666092011-09-01 15:42:00 -0700164 int state = service.getEncryptionState();
165 if (state == IMountService.ENCRYPTION_STATE_NONE) {
166 Log.w(TAG, "Unexpectedly in CryptKeeper even though there is no encryption.");
167 return true; // Unexpected, but fine, I guess...
168 }
169 return state == IMountService.ENCRYPTION_STATE_OK;
170 } catch (RemoteException e) {
171 Log.w(TAG, "Unable to get encryption state properly");
172 return true;
173 }
174 }
175
176 @Override
177 protected void onPostExecute(Boolean result) {
178 mValidationComplete = true;
179 if (Boolean.FALSE.equals(result)) {
180 Log.w(TAG, "Incomplete, or corrupted encryption detected. Prompting user to wipe.");
181 mEncryptionGoneBad = true;
Ben Komalod4758ef2011-09-08 14:36:08 -0700182 } else {
183 Log.d(TAG, "Encryption state validated. Proceeding to configure UI");
Ben Komalo0e666092011-09-01 15:42:00 -0700184 }
185 setupUi();
186 }
187 }
188
Ben Komalo91a2f052011-08-16 17:48:25 -0700189 private final Handler mHandler = new Handler() {
Jason parksec5a45e2011-01-18 15:28:36 -0600190 @Override
191 public void handleMessage(Message msg) {
Jason parksec5a45e2011-01-18 15:28:36 -0600192 switch (msg.what) {
Jason parksec5a45e2011-01-18 15:28:36 -0600193 case UPDATE_PROGRESS:
Jason parksf8217302011-01-26 13:11:42 -0600194 updateProgress();
Jason parksec5a45e2011-01-18 15:28:36 -0600195 break;
Jason parks35933812011-01-21 15:48:20 -0600196
Jason parksec5a45e2011-01-18 15:28:36 -0600197 case COOLDOWN:
Jason parksf8217302011-01-26 13:11:42 -0600198 cooldown();
Jason parksec5a45e2011-01-18 15:28:36 -0600199 break;
200 }
201 }
202 };
Jason parks35933812011-01-21 15:48:20 -0600203
Ben Komalo91a2f052011-08-16 17:48:25 -0700204 /** @return whether or not this Activity was started for debugging the UI only. */
205 private boolean isDebugView() {
206 return getIntent().hasExtra(EXTRA_FORCE_VIEW);
207 }
208
209 /** @return whether or not this Activity was started for debugging the specific UI view only. */
210 private boolean isDebugView(String viewType /* non-nullable */) {
211 return viewType.equals(getIntent().getStringExtra(EXTRA_FORCE_VIEW));
212 }
213
Jason parks8fd5bc92011-01-12 16:03:31 -0600214 @Override
215 public void onCreate(Bundle savedInstanceState) {
216 super.onCreate(savedInstanceState);
Jason parks35933812011-01-21 15:48:20 -0600217
Andy Stadler95974062011-02-01 17:35:20 -0800218 // If we are not encrypted or encrypting, get out quickly.
Jason parks8fd5bc92011-01-12 16:03:31 -0600219 String state = SystemProperties.get("vold.decrypt");
Ben Komalo91a2f052011-08-16 17:48:25 -0700220 if (!isDebugView() && ("".equals(state) || DECRYPT_STATE.equals(state))) {
Jason parks35933812011-01-21 15:48:20 -0600221 // Disable the crypt keeper.
Jason parks8fd5bc92011-01-12 16:03:31 -0600222 PackageManager pm = getPackageManager();
223 ComponentName name = new ComponentName(this, CryptKeeper.class);
224 pm.setComponentEnabledSetting(name, PackageManager.COMPONENT_ENABLED_STATE_DISABLED, 0);
225 return;
226 }
Jason parks35933812011-01-21 15:48:20 -0600227
Jason parks39f1e042011-01-20 23:29:28 -0600228 // Disable the status bar
229 StatusBarManager sbm = (StatusBarManager) getSystemService(Context.STATUS_BAR_SERVICE);
Andy Stadler13d62042011-01-31 19:21:37 -0800230 sbm.disable(StatusBarManager.DISABLE_EXPAND
231 | StatusBarManager.DISABLE_NOTIFICATION_ICONS
Jason parks39f1e042011-01-20 23:29:28 -0600232 | StatusBarManager.DISABLE_NOTIFICATION_ALERTS
Andy Stadler13d62042011-01-31 19:21:37 -0800233 | StatusBarManager.DISABLE_SYSTEM_INFO
Daniel Sandler4d2bfd12011-10-12 15:34:23 -0400234 | StatusBarManager.DISABLE_HOME
235 | StatusBarManager.DISABLE_RECENT
Andy Stadler13d62042011-01-31 19:21:37 -0800236 | StatusBarManager.DISABLE_BACK);
Andy Stadler14997402011-02-01 15:34:59 -0800237
238 // Check for (and recover) retained instance data
239 Object lastInstance = getLastNonConfigurationInstance();
240 if (lastInstance instanceof NonConfigurationInstanceState) {
241 NonConfigurationInstanceState retained = (NonConfigurationInstanceState) lastInstance;
242 mWakeLock = retained.wakelock;
Ben Komalo04606752011-08-18 14:50:26 -0700243 Log.d(TAG, "Restoring wakelock from NonConfigurationInstanceState");
Andy Stadler14997402011-02-01 15:34:59 -0800244 }
Jason parksec5a45e2011-01-18 15:28:36 -0600245 }
Jason parks35933812011-01-21 15:48:20 -0600246
Andy Stadler95974062011-02-01 17:35:20 -0800247 /**
248 * Note, we defer the state check and screen setup to onStart() because this will be
249 * re-run if the user clicks the power button (sleeping/waking the screen), and this is
250 * especially important if we were to lose the wakelock for any reason.
251 */
252 @Override
253 public void onStart() {
254 super.onStart();
255
Ben Komalod4758ef2011-09-08 14:36:08 -0700256 setupUi();
Ben Komalo0e666092011-09-01 15:42:00 -0700257 }
258
259 /**
260 * Initializes the UI based on the current state of encryption.
261 * This is idempotent - calling repeatedly will simply re-initialize the UI.
262 */
263 private void setupUi() {
264 if (mEncryptionGoneBad || isDebugView(FORCE_VIEW_ERROR)) {
265 setContentView(R.layout.crypt_keeper_progress);
266 showFactoryReset();
267 return;
268 }
269
Andy Stadler95974062011-02-01 17:35:20 -0800270 String progress = SystemProperties.get("vold.encrypt_progress");
Ben Komalo0e666092011-09-01 15:42:00 -0700271 if (!"".equals(progress) || isDebugView(FORCE_VIEW_PROGRESS)) {
Andy Stadler95974062011-02-01 17:35:20 -0800272 setContentView(R.layout.crypt_keeper_progress);
273 encryptionProgressInit();
Ben Komalod4758ef2011-09-08 14:36:08 -0700274 } else if (mValidationComplete) {
Andy Stadler95974062011-02-01 17:35:20 -0800275 setContentView(R.layout.crypt_keeper_password_entry);
276 passwordEntryInit();
Ben Komalod4758ef2011-09-08 14:36:08 -0700277 } else if (!mValidationRequested) {
278 // We're supposed to be encrypted, but no validation has been done.
279 new ValidationTask().execute((Void[]) null);
280 mValidationRequested = true;
Andy Stadler95974062011-02-01 17:35:20 -0800281 }
282 }
283
Jason parksf8217302011-01-26 13:11:42 -0600284 @Override
285 public void onStop() {
286 super.onStop();
287
288 mHandler.removeMessages(COOLDOWN);
289 mHandler.removeMessages(UPDATE_PROGRESS);
Andy Stadler14997402011-02-01 15:34:59 -0800290 }
291
292 /**
293 * Reconfiguring, so propagate the wakelock to the next instance. This runs between onStop()
294 * and onDestroy() and only if we are changing configuration (e.g. rotation). Also clears
295 * mWakeLock so the subsequent call to onDestroy does not release it.
296 */
297 @Override
298 public Object onRetainNonConfigurationInstance() {
299 NonConfigurationInstanceState state = new NonConfigurationInstanceState(mWakeLock);
Ben Komalo04606752011-08-18 14:50:26 -0700300 Log.d(TAG, "Handing wakelock off to NonConfigurationInstanceState");
Andy Stadler14997402011-02-01 15:34:59 -0800301 mWakeLock = null;
302 return state;
303 }
304
305 @Override
306 public void onDestroy() {
307 super.onDestroy();
Jason parksf8217302011-01-26 13:11:42 -0600308
309 if (mWakeLock != null) {
Ben Komalo04606752011-08-18 14:50:26 -0700310 Log.d(TAG, "Releasing and destroying wakelock");
Jason parksf8217302011-01-26 13:11:42 -0600311 mWakeLock.release();
312 mWakeLock = null;
313 }
314 }
315
Jason parksec5a45e2011-01-18 15:28:36 -0600316 private void encryptionProgressInit() {
Jason parks35933812011-01-21 15:48:20 -0600317 // Accquire a partial wakelock to prevent the device from sleeping. Note
318 // we never release this wakelock as we will be restarted after the device
319 // is encrypted.
320
Ben Komalo04606752011-08-18 14:50:26 -0700321 Log.d(TAG, "Encryption progress screen initializing.");
Ben Komalo9ee164f2011-09-21 10:40:50 -0700322 if (mWakeLock == null) {
Ben Komalo04606752011-08-18 14:50:26 -0700323 Log.d(TAG, "Acquiring wakelock.");
324 PowerManager pm = (PowerManager) getSystemService(Context.POWER_SERVICE);
325 mWakeLock = pm.newWakeLock(PowerManager.FULL_WAKE_LOCK, TAG);
326 mWakeLock.acquire();
327 }
Jason parks35933812011-01-21 15:48:20 -0600328
Jason parksf8217302011-01-26 13:11:42 -0600329 ProgressBar progressBar = (ProgressBar) findViewById(R.id.progress_bar);
330 progressBar.setIndeterminate(true);
331
332 updateProgress();
333 }
334
Andy Stadler13d62042011-01-31 19:21:37 -0800335 private void showFactoryReset() {
336 // Hide the encryption-bot to make room for the "factory reset" button
337 findViewById(R.id.encroid).setVisibility(View.GONE);
338
339 // Show the reset button, failure text, and a divider
340 Button button = (Button) findViewById(R.id.factory_reset);
341 button.setVisibility(View.VISIBLE);
342 button.setOnClickListener(new OnClickListener() {
343 public void onClick(View v) {
344 // Factory reset the device.
345 sendBroadcast(new Intent("android.intent.action.MASTER_CLEAR"));
346 }
347 });
348
349 TextView tv = (TextView) findViewById(R.id.title);
350 tv.setText(R.string.crypt_keeper_failed_title);
351
352 tv = (TextView) findViewById(R.id.status);
353 tv.setText(R.string.crypt_keeper_failed_summary);
354
355 View view = findViewById(R.id.bottom_divider);
Ben Komalof0104df2011-08-16 17:48:42 -0700356 if (view != null) {
357 view.setVisibility(View.VISIBLE);
358 }
Andy Stadler13d62042011-01-31 19:21:37 -0800359 }
360
Jason parksf8217302011-01-26 13:11:42 -0600361 private void updateProgress() {
362 String state = SystemProperties.get("vold.encrypt_progress");
363
Ben Komalo0e666092011-09-01 15:42:00 -0700364 if ("error_partially_encrypted".equals(state)) {
Andy Stadler13d62042011-01-31 19:21:37 -0800365 showFactoryReset();
366 return;
367 }
368
Jason parksf8217302011-01-26 13:11:42 -0600369 int progress = 0;
370 try {
Ben Komalo91a2f052011-08-16 17:48:25 -0700371 // Force a 50% progress state when debugging the view.
372 progress = isDebugView() ? 50 : Integer.parseInt(state);
Jason parksf8217302011-01-26 13:11:42 -0600373 } catch (Exception e) {
374 Log.w(TAG, "Error parsing progress: " + e.toString());
375 }
376
377 CharSequence status = getText(R.string.crypt_keeper_setup_description);
Ben Komalo04606752011-08-18 14:50:26 -0700378 Log.v(TAG, "Encryption progress: " + progress);
Jason parksf8217302011-01-26 13:11:42 -0600379 TextView tv = (TextView) findViewById(R.id.status);
380 tv.setText(TextUtils.expandTemplate(status, Integer.toString(progress)));
381
382 // Check the progress every 5 seconds
383 mHandler.removeMessages(UPDATE_PROGRESS);
384 mHandler.sendEmptyMessageDelayed(UPDATE_PROGRESS, 5000);
385 }
386
387 private void cooldown() {
388 TextView tv = (TextView) findViewById(R.id.status);
Andy Stadler13d62042011-01-31 19:21:37 -0800389
Jason parksf8217302011-01-26 13:11:42 -0600390 if (mCooldown <= 0) {
391 // Re-enable the password entry
Jason parks06c5ff42011-03-01 10:17:40 -0600392 mPasswordEntry.setEnabled(true);
Jason parksf8217302011-01-26 13:11:42 -0600393
Andy Stadler13d62042011-01-31 19:21:37 -0800394 tv.setVisibility(View.GONE);
Jason parksf8217302011-01-26 13:11:42 -0600395 } else {
Andy Stadler13d62042011-01-31 19:21:37 -0800396 CharSequence template = getText(R.string.crypt_keeper_cooldown);
397 tv.setText(TextUtils.expandTemplate(template, Integer.toString(mCooldown)));
398
399 tv.setVisibility(View.VISIBLE);
Jason parksf8217302011-01-26 13:11:42 -0600400
401 mCooldown--;
402 mHandler.removeMessages(COOLDOWN);
403 mHandler.sendEmptyMessageDelayed(COOLDOWN, 1000); // Tick every second
404 }
Jason parksec5a45e2011-01-18 15:28:36 -0600405 }
Jason parks35933812011-01-21 15:48:20 -0600406
Jason parksec5a45e2011-01-18 15:28:36 -0600407 private void passwordEntryInit() {
Jason parks06c5ff42011-03-01 10:17:40 -0600408 mPasswordEntry = (EditText) findViewById(R.id.passwordEntry);
409 mPasswordEntry.setOnEditorActionListener(this);
Ben Komalo9fcb6a72011-08-26 14:40:18 -0700410 mPasswordEntry.requestFocus();
Jason parks35933812011-01-21 15:48:20 -0600411
Ben Komalo9fcb6a72011-08-26 14:40:18 -0700412 View imeSwitcher = findViewById(R.id.switch_ime_button);
413 final InputMethodManager imm = (InputMethodManager) getSystemService(
414 Context.INPUT_METHOD_SERVICE);
415 if (imeSwitcher != null && hasMultipleEnabledIMEsOrSubtypes(imm, false)) {
416 imeSwitcher.setVisibility(View.VISIBLE);
417 imeSwitcher.setOnClickListener(new OnClickListener() {
418 public void onClick(View v) {
419 imm.showInputMethodPicker();
420 }
421 });
Jason parks00046d62011-06-13 17:38:45 -0500422 }
David Brown8373b452011-06-20 12:38:45 -0700423
Ben Komalo9fcb6a72011-08-26 14:40:18 -0700424 // Asynchronously throw up the IME, since there are issues with requesting it to be shown
425 // immediately.
426 mHandler.postDelayed(new Runnable() {
427 @Override public void run() {
428 imm.showSoftInputUnchecked(0, null);
429 }
430 }, 0);
431
David Brown8373b452011-06-20 12:38:45 -0700432 updateEmergencyCallButtonState();
Jason parks8fd5bc92011-01-12 16:03:31 -0600433 }
434
Ben Komalo9fcb6a72011-08-26 14:40:18 -0700435 /**
436 * Method adapted from com.android.inputmethod.latin.Utils
437 *
438 * @param imm The input method manager
439 * @param shouldIncludeAuxiliarySubtypes
440 * @return true if we have multiple IMEs to choose from
441 */
442 private boolean hasMultipleEnabledIMEsOrSubtypes(InputMethodManager imm,
443 final boolean shouldIncludeAuxiliarySubtypes) {
444 final List<InputMethodInfo> enabledImis = imm.getEnabledInputMethodList();
445
446 // Number of the filtered IMEs
447 int filteredImisCount = 0;
448
449 for (InputMethodInfo imi : enabledImis) {
450 // We can return true immediately after we find two or more filtered IMEs.
451 if (filteredImisCount > 1) return true;
452 final List<InputMethodSubtype> subtypes =
453 imm.getEnabledInputMethodSubtypeList(imi, true);
454 // IMEs that have no subtypes should be counted.
455 if (subtypes.isEmpty()) {
456 ++filteredImisCount;
457 continue;
458 }
459
460 int auxCount = 0;
461 for (InputMethodSubtype subtype : subtypes) {
462 if (subtype.isAuxiliary()) {
463 ++auxCount;
464 }
465 }
466 final int nonAuxCount = subtypes.size() - auxCount;
467
468 // IMEs that have one or more non-auxiliary subtypes should be counted.
469 // If shouldIncludeAuxiliarySubtypes is true, IMEs that have two or more auxiliary
470 // subtypes should be counted as well.
471 if (nonAuxCount > 0 || (shouldIncludeAuxiliarySubtypes && auxCount > 1)) {
472 ++filteredImisCount;
473 continue;
474 }
475 }
476
477 return filteredImisCount > 1
478 // imm.getEnabledInputMethodSubtypeList(null, false) will return the current IME's enabled
479 // input method subtype (The current IME should be LatinIME.)
480 || imm.getEnabledInputMethodSubtypeList(null, false).size() > 1;
481 }
482
Jason parks8fd5bc92011-01-12 16:03:31 -0600483 private IMountService getMountService() {
484 IBinder service = ServiceManager.getService("mount");
485 if (service != null) {
486 return IMountService.Stub.asInterface(service);
487 }
488 return null;
489 }
490
491 @Override
492 public boolean onEditorAction(TextView v, int actionId, KeyEvent event) {
Jason parks00046d62011-06-13 17:38:45 -0500493 if (actionId == EditorInfo.IME_NULL || actionId == EditorInfo.IME_ACTION_DONE) {
Jason parks8fd5bc92011-01-12 16:03:31 -0600494 // Get the password
495 String password = v.getText().toString();
496
Jason parksec5a45e2011-01-18 15:28:36 -0600497 if (TextUtils.isEmpty(password)) {
498 return true;
499 }
Jason parks35933812011-01-21 15:48:20 -0600500
Jason parks8fd5bc92011-01-12 16:03:31 -0600501 // Now that we have the password clear the password field.
502 v.setText(null);
503
Jason parks06c5ff42011-03-01 10:17:40 -0600504 // Disable the password entry while checking the password. This
505 // we either be reenabled if the password was wrong or after the
506 // cooldown period.
507 mPasswordEntry.setEnabled(false);
Jason parks8fd5bc92011-01-12 16:03:31 -0600508
Ben Komalo04606752011-08-18 14:50:26 -0700509 Log.d(TAG, "Attempting to send command to decrypt");
Jason parks06c5ff42011-03-01 10:17:40 -0600510 new DecryptTask().execute(password);
Jason parks35933812011-01-21 15:48:20 -0600511
Jason parks8fd5bc92011-01-12 16:03:31 -0600512 return true;
513 }
514 return false;
515 }
David Brown8373b452011-06-20 12:38:45 -0700516
517 //
518 // Code to update the state of, and handle clicks from, the "Emergency call" button.
519 //
520 // This code is mostly duplicated from the corresponding code in
521 // LockPatternUtils and LockPatternKeyguardView under frameworks/base.
522 //
523
524 private void updateEmergencyCallButtonState() {
525 Button button = (Button) findViewById(R.id.emergencyCallButton);
526 // The button isn't present at all in some configurations.
527 if (button == null) return;
528
529 if (isEmergencyCallCapable()) {
530 button.setVisibility(View.VISIBLE);
531 button.setOnClickListener(new View.OnClickListener() {
532 public void onClick(View v) {
533 takeEmergencyCallAction();
534 }
535 });
536 } else {
537 button.setVisibility(View.GONE);
538 return;
539 }
540
541 int newState = TelephonyManager.getDefault().getCallState();
542 int textId;
543 if (newState == TelephonyManager.CALL_STATE_OFFHOOK) {
544 // show "return to call" text and show phone icon
545 textId = R.string.cryptkeeper_return_to_call;
546 int phoneCallIcon = R.drawable.stat_sys_phone_call;
547 button.setCompoundDrawablesWithIntrinsicBounds(phoneCallIcon, 0, 0, 0);
548 } else {
549 textId = R.string.cryptkeeper_emergency_call;
550 int emergencyIcon = R.drawable.ic_emergency;
551 button.setCompoundDrawablesWithIntrinsicBounds(emergencyIcon, 0, 0, 0);
552 }
553 button.setText(textId);
554 }
555
556 private boolean isEmergencyCallCapable() {
557 return getResources().getBoolean(com.android.internal.R.bool.config_voice_capable);
558 }
559
560 private void takeEmergencyCallAction() {
561 if (TelephonyManager.getDefault().getCallState() == TelephonyManager.CALL_STATE_OFFHOOK) {
562 resumeCall();
563 } else {
564 launchEmergencyDialer();
565 }
566 }
567
568 private void resumeCall() {
569 ITelephony phone = ITelephony.Stub.asInterface(ServiceManager.checkService("phone"));
570 if (phone != null) {
571 try {
572 phone.showCallScreen();
573 } catch (RemoteException e) {
574 Log.e(TAG, "Error calling ITelephony service: " + e);
575 }
576 }
577 }
578
579 private void launchEmergencyDialer() {
580 Intent intent = new Intent(ACTION_EMERGENCY_DIAL);
581 intent.setFlags(Intent.FLAG_ACTIVITY_NEW_TASK
582 | Intent.FLAG_ACTIVITY_EXCLUDE_FROM_RECENTS);
583 startActivity(intent);
584 }
585}