/* * Copyright (C) 2015 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License */ package com.android.server; import com.android.internal.widget.LockPatternUtils; import com.android.internal.widget.LockPatternUtils.StrongAuthTracker; import android.app.trust.IStrongAuthTracker; import android.content.Context; import android.os.DeadObjectException; import android.os.Handler; import android.os.Message; import android.os.RemoteException; import android.os.UserHandle; import android.util.Slog; import android.util.SparseIntArray; import java.util.ArrayList; import static com.android.internal.widget.LockPatternUtils.StrongAuthTracker.STRONG_AUTH_NOT_REQUIRED; /** * Keeps track of requests for strong authentication. */ public class LockSettingsStrongAuth { private static final String TAG = "LockSettings"; private static final int MSG_REQUIRE_STRONG_AUTH = 1; private static final int MSG_REGISTER_TRACKER = 2; private static final int MSG_UNREGISTER_TRACKER = 3; private static final int MSG_REMOVE_USER = 4; private final ArrayList<IStrongAuthTracker> mStrongAuthTrackers = new ArrayList<>(); private final SparseIntArray mStrongAuthForUser = new SparseIntArray(); private final int mDefaultStrongAuthFlags; public LockSettingsStrongAuth(Context context) { mDefaultStrongAuthFlags = StrongAuthTracker.getDefaultFlags(context); } private void handleAddStrongAuthTracker(IStrongAuthTracker tracker) { for (int i = 0; i < mStrongAuthTrackers.size(); i++) { if (mStrongAuthTrackers.get(i).asBinder() == tracker.asBinder()) { return; } } mStrongAuthTrackers.add(tracker); for (int i = 0; i < mStrongAuthForUser.size(); i++) { int key = mStrongAuthForUser.keyAt(i); int value = mStrongAuthForUser.valueAt(i); try { tracker.onStrongAuthRequiredChanged(value, key); } catch (RemoteException e) { Slog.e(TAG, "Exception while adding StrongAuthTracker.", e); } } } private void handleRemoveStrongAuthTracker(IStrongAuthTracker tracker) { for (int i = 0; i < mStrongAuthTrackers.size(); i++) { if (mStrongAuthTrackers.get(i).asBinder() == tracker.asBinder()) { mStrongAuthTrackers.remove(i); return; } } } private void handleRequireStrongAuth(int strongAuthReason, int userId) { if (userId == UserHandle.USER_ALL) { for (int i = 0; i < mStrongAuthForUser.size(); i++) { int key = mStrongAuthForUser.keyAt(i); handleRequireStrongAuthOneUser(strongAuthReason, key); } } else { handleRequireStrongAuthOneUser(strongAuthReason, userId); } } private void handleRequireStrongAuthOneUser(int strongAuthReason, int userId) { int oldValue = mStrongAuthForUser.get(userId, mDefaultStrongAuthFlags); int newValue = strongAuthReason == STRONG_AUTH_NOT_REQUIRED ? STRONG_AUTH_NOT_REQUIRED : (oldValue | strongAuthReason); if (oldValue != newValue) { mStrongAuthForUser.put(userId, newValue); notifyStrongAuthTrackers(newValue, userId); } } private void handleRemoveUser(int userId) { int index = mStrongAuthForUser.indexOfKey(userId); if (index >= 0) { mStrongAuthForUser.removeAt(index); notifyStrongAuthTrackers(mDefaultStrongAuthFlags, userId); } } private void notifyStrongAuthTrackers(int strongAuthReason, int userId) { for (int i = 0; i < mStrongAuthTrackers.size(); i++) { try { mStrongAuthTrackers.get(i).onStrongAuthRequiredChanged(strongAuthReason, userId); } catch (DeadObjectException e) { Slog.d(TAG, "Removing dead StrongAuthTracker."); mStrongAuthTrackers.remove(i); i--; } catch (RemoteException e) { Slog.e(TAG, "Exception while notifying StrongAuthTracker.", e); } } } public void registerStrongAuthTracker(IStrongAuthTracker tracker) { mHandler.obtainMessage(MSG_REGISTER_TRACKER, tracker).sendToTarget(); } public void unregisterStrongAuthTracker(IStrongAuthTracker tracker) { mHandler.obtainMessage(MSG_UNREGISTER_TRACKER, tracker).sendToTarget(); } public void removeUser(int userId) { mHandler.obtainMessage(MSG_REMOVE_USER, userId, 0).sendToTarget(); } public void requireStrongAuth(int strongAuthReason, int userId) { if (userId == UserHandle.USER_ALL || userId >= UserHandle.USER_SYSTEM) { mHandler.obtainMessage(MSG_REQUIRE_STRONG_AUTH, strongAuthReason, userId).sendToTarget(); } else { throw new IllegalArgumentException( "userId must be an explicit user id or USER_ALL"); } } public void reportUnlock(int userId) { requireStrongAuth(STRONG_AUTH_NOT_REQUIRED, userId); } private final Handler mHandler = new Handler() { @Override public void handleMessage(Message msg) { switch (msg.what) { case MSG_REGISTER_TRACKER: handleAddStrongAuthTracker((IStrongAuthTracker) msg.obj); break; case MSG_UNREGISTER_TRACKER: handleRemoveStrongAuthTracker((IStrongAuthTracker) msg.obj); break; case MSG_REQUIRE_STRONG_AUTH: handleRequireStrongAuth(msg.arg1, msg.arg2); break; case MSG_REMOVE_USER: handleRemoveUser(msg.arg1); break; } } }; }