blob: 4a7b4fd7e120be28c53f4d49b1091e8e92c47995 [file] [log] [blame]
Jason parks8fd5bc92011-01-12 16:03:31 -06001/*
2 * Copyright (C) 2011 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17package com.android.settings;
18
Jason parks8fd5bc92011-01-12 16:03:31 -060019import android.app.Activity;
20import android.app.StatusBarManager;
21import android.content.ComponentName;
22import android.content.Context;
Jason parksec5a45e2011-01-18 15:28:36 -060023import android.content.Intent;
Jason parks8fd5bc92011-01-12 16:03:31 -060024import android.content.pm.PackageManager;
Jason parks06c5ff42011-03-01 10:17:40 -060025import android.os.AsyncTask;
Jason parks8fd5bc92011-01-12 16:03:31 -060026import android.os.Bundle;
Jason parksec5a45e2011-01-18 15:28:36 -060027import android.os.Handler;
Jason parks8fd5bc92011-01-12 16:03:31 -060028import android.os.IBinder;
Jason parksec5a45e2011-01-18 15:28:36 -060029import android.os.Message;
Jason parks35933812011-01-21 15:48:20 -060030import android.os.PowerManager;
David Brown8373b452011-06-20 12:38:45 -070031import android.os.RemoteException;
Jason parks8fd5bc92011-01-12 16:03:31 -060032import android.os.ServiceManager;
33import android.os.SystemProperties;
34import android.os.storage.IMountService;
David Brown8373b452011-06-20 12:38:45 -070035import android.telephony.TelephonyManager;
Jason parksec5a45e2011-01-18 15:28:36 -060036import android.text.TextUtils;
Jason parks8fd5bc92011-01-12 16:03:31 -060037import android.util.Log;
38import android.view.KeyEvent;
Andy Stadler13d62042011-01-31 19:21:37 -080039import android.view.View;
40import android.view.View.OnClickListener;
Jason parks8fd5bc92011-01-12 16:03:31 -060041import android.view.inputmethod.EditorInfo;
Ben Komalo9fcb6a72011-08-26 14:40:18 -070042import android.view.inputmethod.InputMethodInfo;
Jason parks75c085e2011-02-10 14:03:47 -060043import android.view.inputmethod.InputMethodManager;
Ben Komalo9fcb6a72011-08-26 14:40:18 -070044import android.view.inputmethod.InputMethodSubtype;
Andy Stadler13d62042011-01-31 19:21:37 -080045import android.widget.Button;
Jason parksec5a45e2011-01-18 15:28:36 -060046import android.widget.EditText;
47import android.widget.ProgressBar;
Jason parks8fd5bc92011-01-12 16:03:31 -060048import android.widget.TextView;
49
Ben Komalo91a2f052011-08-16 17:48:25 -070050import com.android.internal.telephony.ITelephony;
Ben Komalo9fcb6a72011-08-26 14:40:18 -070051
52import java.util.List;
Ben Komalo91a2f052011-08-16 17:48:25 -070053
54/**
55 * Settings screens to show the UI flows for encrypting/decrypting the device.
56 *
57 * This may be started via adb for debugging the UI layout, without having to go through
58 * encryption flows everytime. It should be noted that starting the activity in this manner
59 * is only useful for verifying UI-correctness - the behavior will not be identical.
60 * <pre>
61 * $ adb shell pm enable com.android.settings/.CryptKeeper
62 * $ adb shell am start \
63 * -e "com.android.settings.CryptKeeper.DEBUG_FORCE_VIEW" "progress" \
64 * -n com.android.settings/.CryptKeeper
65 * </pre>
66 */
Jason parks8fd5bc92011-01-12 16:03:31 -060067public class CryptKeeper extends Activity implements TextView.OnEditorActionListener {
Jason parksec5a45e2011-01-18 15:28:36 -060068 private static final String TAG = "CryptKeeper";
Jason parks35933812011-01-21 15:48:20 -060069
Jason parks8fd5bc92011-01-12 16:03:31 -060070 private static final String DECRYPT_STATE = "trigger_restart_framework";
Jason parksec5a45e2011-01-18 15:28:36 -060071
72 private static final int UPDATE_PROGRESS = 1;
73 private static final int COOLDOWN = 2;
74
75 private static final int MAX_FAILED_ATTEMPTS = 30;
76 private static final int COOL_DOWN_ATTEMPTS = 10;
77 private static final int COOL_DOWN_INTERVAL = 30; // 30 seconds
78
David Brown8373b452011-06-20 12:38:45 -070079 // Intent action for launching the Emergency Dialer activity.
80 static final String ACTION_EMERGENCY_DIAL = "com.android.phone.EmergencyDialer.DIAL";
81
Ben Komalo91a2f052011-08-16 17:48:25 -070082 // Debug Intent extras so that this Activity may be started via adb for debugging UI layouts
83 private static final String EXTRA_FORCE_VIEW =
84 "com.android.settings.CryptKeeper.DEBUG_FORCE_VIEW";
85 private static final String FORCE_VIEW_PROGRESS = "progress";
86 private static final String FORCE_VIEW_ENTRY = "entry";
87 private static final String FORCE_VIEW_ERROR = "error";
88
Ben Komalo0e666092011-09-01 15:42:00 -070089 /** When encryption is detected, this flag indivates whether or not we've checked for erros. */
90 private boolean mValidationComplete;
Ben Komalod4758ef2011-09-08 14:36:08 -070091 private boolean mValidationRequested;
Ben Komalo0e666092011-09-01 15:42:00 -070092 /** A flag to indicate that the volume is in a bad state (e.g. partially encrypted). */
93 private boolean mEncryptionGoneBad;
94
Andy Stadler14997402011-02-01 15:34:59 -080095 private int mCooldown;
96 PowerManager.WakeLock mWakeLock;
Jason parks06c5ff42011-03-01 10:17:40 -060097 private EditText mPasswordEntry;
Andy Stadler14997402011-02-01 15:34:59 -080098
99 /**
100 * Used to propagate state through configuration changes (e.g. screen rotation)
101 */
102 private static class NonConfigurationInstanceState {
103 final PowerManager.WakeLock wakelock;
104
105 NonConfigurationInstanceState(PowerManager.WakeLock _wakelock) {
106 wakelock = _wakelock;
107 }
108 }
109
Jason parksf1dbf552011-01-24 16:19:28 -0600110 // This activity is used to fade the screen to black after the password is entered.
111 public static class Blank extends Activity {
Andy Stadler13d62042011-01-31 19:21:37 -0800112 @Override
113 public void onCreate(Bundle savedInstanceState) {
114 super.onCreate(savedInstanceState);
115 setContentView(R.layout.crypt_keeper_blank);
116 }
Jason parksf1dbf552011-01-24 16:19:28 -0600117 }
Jason parksec5a45e2011-01-18 15:28:36 -0600118
Jason parks06c5ff42011-03-01 10:17:40 -0600119 private class DecryptTask extends AsyncTask<String, Void, Integer> {
120 @Override
121 protected Integer doInBackground(String... params) {
122 IMountService service = getMountService();
123 try {
124 return service.decryptStorage(params[0]);
125 } catch (Exception e) {
126 Log.e(TAG, "Error while decrypting...", e);
127 return -1;
128 }
129 }
130
131 @Override
132 protected void onPostExecute(Integer failedAttempts) {
133 if (failedAttempts == 0) {
134 // The password was entered successfully. Start the Blank activity
135 // so this activity animates to black before the devices starts. Note
136 // It has 1 second to complete the animation or it will be frozen
137 // until the boot animation comes back up.
138 Intent intent = new Intent(CryptKeeper.this, Blank.class);
139 finish();
140 startActivity(intent);
141 } else if (failedAttempts == MAX_FAILED_ATTEMPTS) {
142 // Factory reset the device.
143 sendBroadcast(new Intent("android.intent.action.MASTER_CLEAR"));
144 } else if ((failedAttempts % COOL_DOWN_ATTEMPTS) == 0) {
145 mCooldown = COOL_DOWN_INTERVAL;
146 cooldown();
147 } else {
148 TextView tv = (TextView) findViewById(R.id.status);
149 tv.setText(R.string.try_again);
150 tv.setVisibility(View.VISIBLE);
151
152 // Reenable the password entry
153 mPasswordEntry.setEnabled(true);
154 }
155 }
156 }
Jason parks75c085e2011-02-10 14:03:47 -0600157
Ben Komalo0e666092011-09-01 15:42:00 -0700158 private class ValidationTask extends AsyncTask<Void, Void, Boolean> {
159 @Override
160 protected Boolean doInBackground(Void... params) {
161 IMountService service = getMountService();
162 try {
Ben Komalod4758ef2011-09-08 14:36:08 -0700163 Log.d(TAG, "Validating encryption state.");
Ben Komalo0e666092011-09-01 15:42:00 -0700164 int state = service.getEncryptionState();
165 if (state == IMountService.ENCRYPTION_STATE_NONE) {
166 Log.w(TAG, "Unexpectedly in CryptKeeper even though there is no encryption.");
167 return true; // Unexpected, but fine, I guess...
168 }
169 return state == IMountService.ENCRYPTION_STATE_OK;
170 } catch (RemoteException e) {
171 Log.w(TAG, "Unable to get encryption state properly");
172 return true;
173 }
174 }
175
176 @Override
177 protected void onPostExecute(Boolean result) {
178 mValidationComplete = true;
179 if (Boolean.FALSE.equals(result)) {
180 Log.w(TAG, "Incomplete, or corrupted encryption detected. Prompting user to wipe.");
181 mEncryptionGoneBad = true;
Ben Komalod4758ef2011-09-08 14:36:08 -0700182 } else {
183 Log.d(TAG, "Encryption state validated. Proceeding to configure UI");
Ben Komalo0e666092011-09-01 15:42:00 -0700184 }
185 setupUi();
186 }
187 }
188
Ben Komalo91a2f052011-08-16 17:48:25 -0700189 private final Handler mHandler = new Handler() {
Jason parksec5a45e2011-01-18 15:28:36 -0600190 @Override
191 public void handleMessage(Message msg) {
Jason parksec5a45e2011-01-18 15:28:36 -0600192 switch (msg.what) {
Jason parksec5a45e2011-01-18 15:28:36 -0600193 case UPDATE_PROGRESS:
Jason parksf8217302011-01-26 13:11:42 -0600194 updateProgress();
Jason parksec5a45e2011-01-18 15:28:36 -0600195 break;
Jason parks35933812011-01-21 15:48:20 -0600196
Jason parksec5a45e2011-01-18 15:28:36 -0600197 case COOLDOWN:
Jason parksf8217302011-01-26 13:11:42 -0600198 cooldown();
Jason parksec5a45e2011-01-18 15:28:36 -0600199 break;
200 }
201 }
202 };
Jason parks35933812011-01-21 15:48:20 -0600203
Ben Komalo91a2f052011-08-16 17:48:25 -0700204 /** @return whether or not this Activity was started for debugging the UI only. */
205 private boolean isDebugView() {
206 return getIntent().hasExtra(EXTRA_FORCE_VIEW);
207 }
208
209 /** @return whether or not this Activity was started for debugging the specific UI view only. */
210 private boolean isDebugView(String viewType /* non-nullable */) {
211 return viewType.equals(getIntent().getStringExtra(EXTRA_FORCE_VIEW));
212 }
213
Jason parks8fd5bc92011-01-12 16:03:31 -0600214 @Override
215 public void onCreate(Bundle savedInstanceState) {
216 super.onCreate(savedInstanceState);
Jason parks35933812011-01-21 15:48:20 -0600217
Andy Stadler95974062011-02-01 17:35:20 -0800218 // If we are not encrypted or encrypting, get out quickly.
Jason parks8fd5bc92011-01-12 16:03:31 -0600219 String state = SystemProperties.get("vold.decrypt");
Ben Komalo91a2f052011-08-16 17:48:25 -0700220 if (!isDebugView() && ("".equals(state) || DECRYPT_STATE.equals(state))) {
Jason parks35933812011-01-21 15:48:20 -0600221 // Disable the crypt keeper.
Jason parks8fd5bc92011-01-12 16:03:31 -0600222 PackageManager pm = getPackageManager();
223 ComponentName name = new ComponentName(this, CryptKeeper.class);
224 pm.setComponentEnabledSetting(name, PackageManager.COMPONENT_ENABLED_STATE_DISABLED, 0);
225 return;
226 }
Jason parks35933812011-01-21 15:48:20 -0600227
Jason parks39f1e042011-01-20 23:29:28 -0600228 // Disable the status bar
229 StatusBarManager sbm = (StatusBarManager) getSystemService(Context.STATUS_BAR_SERVICE);
Andy Stadler13d62042011-01-31 19:21:37 -0800230 sbm.disable(StatusBarManager.DISABLE_EXPAND
231 | StatusBarManager.DISABLE_NOTIFICATION_ICONS
Jason parks39f1e042011-01-20 23:29:28 -0600232 | StatusBarManager.DISABLE_NOTIFICATION_ALERTS
Andy Stadler13d62042011-01-31 19:21:37 -0800233 | StatusBarManager.DISABLE_SYSTEM_INFO
234 | StatusBarManager.DISABLE_NAVIGATION
235 | StatusBarManager.DISABLE_BACK);
Andy Stadler14997402011-02-01 15:34:59 -0800236
237 // Check for (and recover) retained instance data
238 Object lastInstance = getLastNonConfigurationInstance();
239 if (lastInstance instanceof NonConfigurationInstanceState) {
240 NonConfigurationInstanceState retained = (NonConfigurationInstanceState) lastInstance;
241 mWakeLock = retained.wakelock;
Ben Komalo04606752011-08-18 14:50:26 -0700242 Log.d(TAG, "Restoring wakelock from NonConfigurationInstanceState");
Andy Stadler14997402011-02-01 15:34:59 -0800243 }
Jason parksec5a45e2011-01-18 15:28:36 -0600244 }
Jason parks35933812011-01-21 15:48:20 -0600245
Andy Stadler95974062011-02-01 17:35:20 -0800246 /**
247 * Note, we defer the state check and screen setup to onStart() because this will be
248 * re-run if the user clicks the power button (sleeping/waking the screen), and this is
249 * especially important if we were to lose the wakelock for any reason.
250 */
251 @Override
252 public void onStart() {
253 super.onStart();
254
Ben Komalod4758ef2011-09-08 14:36:08 -0700255 setupUi();
Ben Komalo0e666092011-09-01 15:42:00 -0700256 }
257
258 /**
259 * Initializes the UI based on the current state of encryption.
260 * This is idempotent - calling repeatedly will simply re-initialize the UI.
261 */
262 private void setupUi() {
263 if (mEncryptionGoneBad || isDebugView(FORCE_VIEW_ERROR)) {
264 setContentView(R.layout.crypt_keeper_progress);
265 showFactoryReset();
266 return;
267 }
268
Andy Stadler95974062011-02-01 17:35:20 -0800269 String progress = SystemProperties.get("vold.encrypt_progress");
Ben Komalo0e666092011-09-01 15:42:00 -0700270 if (!"".equals(progress) || isDebugView(FORCE_VIEW_PROGRESS)) {
Andy Stadler95974062011-02-01 17:35:20 -0800271 setContentView(R.layout.crypt_keeper_progress);
272 encryptionProgressInit();
Ben Komalod4758ef2011-09-08 14:36:08 -0700273 } else if (mValidationComplete) {
Andy Stadler95974062011-02-01 17:35:20 -0800274 setContentView(R.layout.crypt_keeper_password_entry);
275 passwordEntryInit();
Ben Komalod4758ef2011-09-08 14:36:08 -0700276 } else if (!mValidationRequested) {
277 // We're supposed to be encrypted, but no validation has been done.
278 new ValidationTask().execute((Void[]) null);
279 mValidationRequested = true;
Andy Stadler95974062011-02-01 17:35:20 -0800280 }
281 }
282
Jason parksf8217302011-01-26 13:11:42 -0600283 @Override
284 public void onStop() {
285 super.onStop();
286
287 mHandler.removeMessages(COOLDOWN);
288 mHandler.removeMessages(UPDATE_PROGRESS);
Andy Stadler14997402011-02-01 15:34:59 -0800289 }
290
291 /**
292 * Reconfiguring, so propagate the wakelock to the next instance. This runs between onStop()
293 * and onDestroy() and only if we are changing configuration (e.g. rotation). Also clears
294 * mWakeLock so the subsequent call to onDestroy does not release it.
295 */
296 @Override
297 public Object onRetainNonConfigurationInstance() {
298 NonConfigurationInstanceState state = new NonConfigurationInstanceState(mWakeLock);
Ben Komalo04606752011-08-18 14:50:26 -0700299 Log.d(TAG, "Handing wakelock off to NonConfigurationInstanceState");
Andy Stadler14997402011-02-01 15:34:59 -0800300 mWakeLock = null;
301 return state;
302 }
303
304 @Override
305 public void onDestroy() {
306 super.onDestroy();
Jason parksf8217302011-01-26 13:11:42 -0600307
308 if (mWakeLock != null) {
Ben Komalo04606752011-08-18 14:50:26 -0700309 Log.d(TAG, "Releasing and destroying wakelock");
Jason parksf8217302011-01-26 13:11:42 -0600310 mWakeLock.release();
311 mWakeLock = null;
312 }
313 }
314
Jason parksec5a45e2011-01-18 15:28:36 -0600315 private void encryptionProgressInit() {
Jason parks35933812011-01-21 15:48:20 -0600316 // Accquire a partial wakelock to prevent the device from sleeping. Note
317 // we never release this wakelock as we will be restarted after the device
318 // is encrypted.
319
Ben Komalo04606752011-08-18 14:50:26 -0700320 Log.d(TAG, "Encryption progress screen initializing.");
Ben Komalo9ee164f2011-09-21 10:40:50 -0700321 if (mWakeLock == null) {
Ben Komalo04606752011-08-18 14:50:26 -0700322 Log.d(TAG, "Acquiring wakelock.");
323 PowerManager pm = (PowerManager) getSystemService(Context.POWER_SERVICE);
324 mWakeLock = pm.newWakeLock(PowerManager.FULL_WAKE_LOCK, TAG);
325 mWakeLock.acquire();
326 }
Jason parks35933812011-01-21 15:48:20 -0600327
Jason parksf8217302011-01-26 13:11:42 -0600328 ProgressBar progressBar = (ProgressBar) findViewById(R.id.progress_bar);
329 progressBar.setIndeterminate(true);
330
331 updateProgress();
332 }
333
Andy Stadler13d62042011-01-31 19:21:37 -0800334 private void showFactoryReset() {
335 // Hide the encryption-bot to make room for the "factory reset" button
336 findViewById(R.id.encroid).setVisibility(View.GONE);
337
338 // Show the reset button, failure text, and a divider
339 Button button = (Button) findViewById(R.id.factory_reset);
340 button.setVisibility(View.VISIBLE);
341 button.setOnClickListener(new OnClickListener() {
342 public void onClick(View v) {
343 // Factory reset the device.
344 sendBroadcast(new Intent("android.intent.action.MASTER_CLEAR"));
345 }
346 });
347
348 TextView tv = (TextView) findViewById(R.id.title);
349 tv.setText(R.string.crypt_keeper_failed_title);
350
351 tv = (TextView) findViewById(R.id.status);
352 tv.setText(R.string.crypt_keeper_failed_summary);
353
354 View view = findViewById(R.id.bottom_divider);
Ben Komalof0104df2011-08-16 17:48:42 -0700355 if (view != null) {
356 view.setVisibility(View.VISIBLE);
357 }
Andy Stadler13d62042011-01-31 19:21:37 -0800358 }
359
Jason parksf8217302011-01-26 13:11:42 -0600360 private void updateProgress() {
361 String state = SystemProperties.get("vold.encrypt_progress");
362
Ben Komalo0e666092011-09-01 15:42:00 -0700363 if ("error_partially_encrypted".equals(state)) {
Andy Stadler13d62042011-01-31 19:21:37 -0800364 showFactoryReset();
365 return;
366 }
367
Jason parksf8217302011-01-26 13:11:42 -0600368 int progress = 0;
369 try {
Ben Komalo91a2f052011-08-16 17:48:25 -0700370 // Force a 50% progress state when debugging the view.
371 progress = isDebugView() ? 50 : Integer.parseInt(state);
Jason parksf8217302011-01-26 13:11:42 -0600372 } catch (Exception e) {
373 Log.w(TAG, "Error parsing progress: " + e.toString());
374 }
375
376 CharSequence status = getText(R.string.crypt_keeper_setup_description);
Ben Komalo04606752011-08-18 14:50:26 -0700377 Log.v(TAG, "Encryption progress: " + progress);
Jason parksf8217302011-01-26 13:11:42 -0600378 TextView tv = (TextView) findViewById(R.id.status);
379 tv.setText(TextUtils.expandTemplate(status, Integer.toString(progress)));
380
381 // Check the progress every 5 seconds
382 mHandler.removeMessages(UPDATE_PROGRESS);
383 mHandler.sendEmptyMessageDelayed(UPDATE_PROGRESS, 5000);
384 }
385
386 private void cooldown() {
387 TextView tv = (TextView) findViewById(R.id.status);
Andy Stadler13d62042011-01-31 19:21:37 -0800388
Jason parksf8217302011-01-26 13:11:42 -0600389 if (mCooldown <= 0) {
390 // Re-enable the password entry
Jason parks06c5ff42011-03-01 10:17:40 -0600391 mPasswordEntry.setEnabled(true);
Jason parksf8217302011-01-26 13:11:42 -0600392
Andy Stadler13d62042011-01-31 19:21:37 -0800393 tv.setVisibility(View.GONE);
Jason parksf8217302011-01-26 13:11:42 -0600394 } else {
Andy Stadler13d62042011-01-31 19:21:37 -0800395 CharSequence template = getText(R.string.crypt_keeper_cooldown);
396 tv.setText(TextUtils.expandTemplate(template, Integer.toString(mCooldown)));
397
398 tv.setVisibility(View.VISIBLE);
Jason parksf8217302011-01-26 13:11:42 -0600399
400 mCooldown--;
401 mHandler.removeMessages(COOLDOWN);
402 mHandler.sendEmptyMessageDelayed(COOLDOWN, 1000); // Tick every second
403 }
Jason parksec5a45e2011-01-18 15:28:36 -0600404 }
Jason parks35933812011-01-21 15:48:20 -0600405
Jason parksec5a45e2011-01-18 15:28:36 -0600406 private void passwordEntryInit() {
Jason parks06c5ff42011-03-01 10:17:40 -0600407 mPasswordEntry = (EditText) findViewById(R.id.passwordEntry);
408 mPasswordEntry.setOnEditorActionListener(this);
Ben Komalo9fcb6a72011-08-26 14:40:18 -0700409 mPasswordEntry.requestFocus();
Jason parks35933812011-01-21 15:48:20 -0600410
Ben Komalo9fcb6a72011-08-26 14:40:18 -0700411 View imeSwitcher = findViewById(R.id.switch_ime_button);
412 final InputMethodManager imm = (InputMethodManager) getSystemService(
413 Context.INPUT_METHOD_SERVICE);
414 if (imeSwitcher != null && hasMultipleEnabledIMEsOrSubtypes(imm, false)) {
415 imeSwitcher.setVisibility(View.VISIBLE);
416 imeSwitcher.setOnClickListener(new OnClickListener() {
417 public void onClick(View v) {
418 imm.showInputMethodPicker();
419 }
420 });
Jason parks00046d62011-06-13 17:38:45 -0500421 }
David Brown8373b452011-06-20 12:38:45 -0700422
Ben Komalo9fcb6a72011-08-26 14:40:18 -0700423 // Asynchronously throw up the IME, since there are issues with requesting it to be shown
424 // immediately.
425 mHandler.postDelayed(new Runnable() {
426 @Override public void run() {
427 imm.showSoftInputUnchecked(0, null);
428 }
429 }, 0);
430
David Brown8373b452011-06-20 12:38:45 -0700431 updateEmergencyCallButtonState();
Jason parks8fd5bc92011-01-12 16:03:31 -0600432 }
433
Ben Komalo9fcb6a72011-08-26 14:40:18 -0700434 /**
435 * Method adapted from com.android.inputmethod.latin.Utils
436 *
437 * @param imm The input method manager
438 * @param shouldIncludeAuxiliarySubtypes
439 * @return true if we have multiple IMEs to choose from
440 */
441 private boolean hasMultipleEnabledIMEsOrSubtypes(InputMethodManager imm,
442 final boolean shouldIncludeAuxiliarySubtypes) {
443 final List<InputMethodInfo> enabledImis = imm.getEnabledInputMethodList();
444
445 // Number of the filtered IMEs
446 int filteredImisCount = 0;
447
448 for (InputMethodInfo imi : enabledImis) {
449 // We can return true immediately after we find two or more filtered IMEs.
450 if (filteredImisCount > 1) return true;
451 final List<InputMethodSubtype> subtypes =
452 imm.getEnabledInputMethodSubtypeList(imi, true);
453 // IMEs that have no subtypes should be counted.
454 if (subtypes.isEmpty()) {
455 ++filteredImisCount;
456 continue;
457 }
458
459 int auxCount = 0;
460 for (InputMethodSubtype subtype : subtypes) {
461 if (subtype.isAuxiliary()) {
462 ++auxCount;
463 }
464 }
465 final int nonAuxCount = subtypes.size() - auxCount;
466
467 // IMEs that have one or more non-auxiliary subtypes should be counted.
468 // If shouldIncludeAuxiliarySubtypes is true, IMEs that have two or more auxiliary
469 // subtypes should be counted as well.
470 if (nonAuxCount > 0 || (shouldIncludeAuxiliarySubtypes && auxCount > 1)) {
471 ++filteredImisCount;
472 continue;
473 }
474 }
475
476 return filteredImisCount > 1
477 // imm.getEnabledInputMethodSubtypeList(null, false) will return the current IME's enabled
478 // input method subtype (The current IME should be LatinIME.)
479 || imm.getEnabledInputMethodSubtypeList(null, false).size() > 1;
480 }
481
Jason parks8fd5bc92011-01-12 16:03:31 -0600482 private IMountService getMountService() {
483 IBinder service = ServiceManager.getService("mount");
484 if (service != null) {
485 return IMountService.Stub.asInterface(service);
486 }
487 return null;
488 }
489
490 @Override
491 public boolean onEditorAction(TextView v, int actionId, KeyEvent event) {
Jason parks00046d62011-06-13 17:38:45 -0500492 if (actionId == EditorInfo.IME_NULL || actionId == EditorInfo.IME_ACTION_DONE) {
Jason parks8fd5bc92011-01-12 16:03:31 -0600493 // Get the password
494 String password = v.getText().toString();
495
Jason parksec5a45e2011-01-18 15:28:36 -0600496 if (TextUtils.isEmpty(password)) {
497 return true;
498 }
Jason parks35933812011-01-21 15:48:20 -0600499
Jason parks8fd5bc92011-01-12 16:03:31 -0600500 // Now that we have the password clear the password field.
501 v.setText(null);
502
Jason parks06c5ff42011-03-01 10:17:40 -0600503 // Disable the password entry while checking the password. This
504 // we either be reenabled if the password was wrong or after the
505 // cooldown period.
506 mPasswordEntry.setEnabled(false);
Jason parks8fd5bc92011-01-12 16:03:31 -0600507
Ben Komalo04606752011-08-18 14:50:26 -0700508 Log.d(TAG, "Attempting to send command to decrypt");
Jason parks06c5ff42011-03-01 10:17:40 -0600509 new DecryptTask().execute(password);
Jason parks35933812011-01-21 15:48:20 -0600510
Jason parks8fd5bc92011-01-12 16:03:31 -0600511 return true;
512 }
513 return false;
514 }
David Brown8373b452011-06-20 12:38:45 -0700515
516 //
517 // Code to update the state of, and handle clicks from, the "Emergency call" button.
518 //
519 // This code is mostly duplicated from the corresponding code in
520 // LockPatternUtils and LockPatternKeyguardView under frameworks/base.
521 //
522
523 private void updateEmergencyCallButtonState() {
524 Button button = (Button) findViewById(R.id.emergencyCallButton);
525 // The button isn't present at all in some configurations.
526 if (button == null) return;
527
528 if (isEmergencyCallCapable()) {
529 button.setVisibility(View.VISIBLE);
530 button.setOnClickListener(new View.OnClickListener() {
531 public void onClick(View v) {
532 takeEmergencyCallAction();
533 }
534 });
535 } else {
536 button.setVisibility(View.GONE);
537 return;
538 }
539
540 int newState = TelephonyManager.getDefault().getCallState();
541 int textId;
542 if (newState == TelephonyManager.CALL_STATE_OFFHOOK) {
543 // show "return to call" text and show phone icon
544 textId = R.string.cryptkeeper_return_to_call;
545 int phoneCallIcon = R.drawable.stat_sys_phone_call;
546 button.setCompoundDrawablesWithIntrinsicBounds(phoneCallIcon, 0, 0, 0);
547 } else {
548 textId = R.string.cryptkeeper_emergency_call;
549 int emergencyIcon = R.drawable.ic_emergency;
550 button.setCompoundDrawablesWithIntrinsicBounds(emergencyIcon, 0, 0, 0);
551 }
552 button.setText(textId);
553 }
554
555 private boolean isEmergencyCallCapable() {
556 return getResources().getBoolean(com.android.internal.R.bool.config_voice_capable);
557 }
558
559 private void takeEmergencyCallAction() {
560 if (TelephonyManager.getDefault().getCallState() == TelephonyManager.CALL_STATE_OFFHOOK) {
561 resumeCall();
562 } else {
563 launchEmergencyDialer();
564 }
565 }
566
567 private void resumeCall() {
568 ITelephony phone = ITelephony.Stub.asInterface(ServiceManager.checkService("phone"));
569 if (phone != null) {
570 try {
571 phone.showCallScreen();
572 } catch (RemoteException e) {
573 Log.e(TAG, "Error calling ITelephony service: " + e);
574 }
575 }
576 }
577
578 private void launchEmergencyDialer() {
579 Intent intent = new Intent(ACTION_EMERGENCY_DIAL);
580 intent.setFlags(Intent.FLAG_ACTIVITY_NEW_TASK
581 | Intent.FLAG_ACTIVITY_EXCLUDE_FROM_RECENTS);
582 startActivity(intent);
583 }
584}