2 * Copyright (C) 2010 The Android Open Source Project
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
8 * http://www.apache.org/licenses/LICENSE-2.0
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
17 package com.android.settings.wifi;
19 import android.content.Context;
20 import android.content.res.Resources;
21 import android.net.IpConfiguration;
22 import android.net.IpConfiguration.IpAssignment;
23 import android.net.IpConfiguration.ProxySettings;
24 import android.net.LinkAddress;
25 import android.net.NetworkInfo.DetailedState;
26 import android.net.NetworkUtils;
27 import android.net.ProxyInfo;
28 import android.net.StaticIpConfiguration;
29 import android.net.Uri;
30 import android.net.wifi.WifiConfiguration;
31 import android.net.wifi.WifiConfiguration.AuthAlgorithm;
32 import android.net.wifi.WifiConfiguration.KeyMgmt;
33 import android.net.wifi.WifiEnterpriseConfig;
34 import android.net.wifi.WifiEnterpriseConfig.Eap;
35 import android.net.wifi.WifiEnterpriseConfig.Phase2;
36 import android.net.wifi.WifiInfo;
37 import android.net.wifi.WifiManager;
38 import android.os.UserManager;
39 import android.security.Credentials;
40 import android.security.KeyStore;
41 import android.text.Editable;
42 import android.text.InputType;
43 import android.text.TextUtils;
44 import android.text.TextWatcher;
45 import android.util.Log;
46 import android.view.KeyEvent;
47 import android.view.View;
48 import android.view.ViewGroup;
49 import android.view.inputmethod.EditorInfo;
50 import android.widget.AdapterView;
51 import android.widget.ArrayAdapter;
52 import android.widget.Button;
53 import android.widget.CheckBox;
54 import android.widget.CompoundButton;
55 import android.widget.CompoundButton.OnCheckedChangeListener;
56 import android.widget.EditText;
57 import android.widget.ImageButton;
58 import android.widget.ScrollView;
59 import android.widget.Spinner;
60 import android.widget.TextView;
62 import androidx.annotation.VisibleForTesting;
64 import com.android.settings.ProxySelector;
65 import com.android.settings.R;
66 import com.android.settings.wifi.details.WifiPrivacyPreferenceController;
67 import com.android.settings.wifi.dpp.WifiDppUtils;
68 import com.android.settingslib.Utils;
69 import com.android.settingslib.utils.ThreadUtils;
70 import com.android.settingslib.wifi.AccessPoint;
72 import java.net.Inet4Address;
73 import java.net.InetAddress;
74 import java.util.ArrayList;
75 import java.util.Arrays;
76 import java.util.Iterator;
79 * The class for allowing UIs like {@link WifiDialog} and {@link WifiConfigUiBase} to
80 * share the logic for controlling buttons, text fields, etc.
82 public class WifiConfigController implements TextWatcher,
83 AdapterView.OnItemSelectedListener, OnCheckedChangeListener,
84 TextView.OnEditorActionListener, View.OnKeyListener {
85 private static final String TAG = "WifiConfigController";
87 private static final String SYSTEM_CA_STORE_PATH = "/system/etc/security/cacerts";
89 private final WifiConfigUiBase mConfigUi;
90 private final View mView;
91 private final AccessPoint mAccessPoint;
93 /* This value comes from "wifi_ip_settings" resource array */
94 private static final int DHCP = 0;
95 private static final int STATIC_IP = 1;
97 /* Constants used for referring to the hidden state of a network. */
98 public static final int HIDDEN_NETWORK = 1;
99 public static final int NOT_HIDDEN_NETWORK = 0;
101 /* These values come from "wifi_proxy_settings" resource array */
102 public static final int PROXY_NONE = 0;
103 public static final int PROXY_STATIC = 1;
104 public static final int PROXY_PAC = 2;
106 /* These values come from "wifi_eap_method" resource array */
107 public static final int WIFI_EAP_METHOD_PEAP = 0;
108 public static final int WIFI_EAP_METHOD_TLS = 1;
109 public static final int WIFI_EAP_METHOD_TTLS = 2;
110 public static final int WIFI_EAP_METHOD_PWD = 3;
111 public static final int WIFI_EAP_METHOD_SIM = 4;
112 public static final int WIFI_EAP_METHOD_AKA = 5;
113 public static final int WIFI_EAP_METHOD_AKA_PRIME = 6;
115 /* These values come from "wifi_peap_phase2_entries" resource array */
116 public static final int WIFI_PEAP_PHASE2_NONE = 0;
117 public static final int WIFI_PEAP_PHASE2_MSCHAPV2 = 1;
118 public static final int WIFI_PEAP_PHASE2_GTC = 2;
119 public static final int WIFI_PEAP_PHASE2_SIM = 3;
120 public static final int WIFI_PEAP_PHASE2_AKA = 4;
121 public static final int WIFI_PEAP_PHASE2_AKA_PRIME = 5;
124 /* Phase2 methods supported by PEAP are limited */
125 private ArrayAdapter<String> mPhase2PeapAdapter;
126 /* Full list of phase2 methods */
127 private ArrayAdapter<String> mPhase2FullAdapter;
129 // e.g. AccessPoint.SECURITY_NONE
131 int mAccessPointSecurity;
132 private TextView mPasswordView;
133 private ImageButton mSsidScanButton;
134 private ImageButton mPasswordScanButton;
136 private String mUnspecifiedCertString;
137 private String mMultipleCertSetString;
138 private String mUseSystemCertsString;
139 private String mDoNotProvideEapUserCertString;
140 private String mDoNotValidateEapServerString;
142 private ScrollView mDialogContainer;
143 private Spinner mSecuritySpinner;
144 private Spinner mEapMethodSpinner;
145 private Spinner mEapCaCertSpinner;
146 private TextView mEapDomainView;
147 private Spinner mPhase2Spinner;
148 // Associated with mPhase2Spinner, one of mPhase2FullAdapter or mPhase2PeapAdapter
149 private ArrayAdapter<String> mPhase2Adapter;
150 private Spinner mEapUserCertSpinner;
151 private TextView mEapIdentityView;
152 private TextView mEapAnonymousView;
154 private Spinner mIpSettingsSpinner;
155 private TextView mIpAddressView;
156 private TextView mGatewayView;
157 private TextView mNetworkPrefixLengthView;
158 private TextView mDns1View;
159 private TextView mDns2View;
161 private Spinner mProxySettingsSpinner;
162 private Spinner mMeteredSettingsSpinner;
163 private Spinner mHiddenSettingsSpinner;
164 private Spinner mPrivacySettingsSpinner;
165 private TextView mHiddenWarningView;
166 private TextView mProxyHostView;
167 private TextView mProxyPortView;
168 private TextView mProxyExclusionListView;
169 private TextView mProxyPacView;
170 private CheckBox mSharedCheckBox;
172 private IpAssignment mIpAssignment = IpAssignment.UNASSIGNED;
173 private ProxySettings mProxySettings = ProxySettings.UNASSIGNED;
174 private ProxyInfo mHttpProxy = null;
175 private StaticIpConfiguration mStaticIpConfiguration = null;
177 private String[] mLevels;
179 private TextView mSsidView;
181 private Context mContext;
184 Integer mSecurityInPosition[];
186 private final WifiManager mWifiManager;
188 public WifiConfigController(WifiConfigUiBase parent, View view, AccessPoint accessPoint,
193 mAccessPoint = accessPoint;
194 mContext = mConfigUi.getContext();
196 // Init Wi-Fi manager
197 mWifiManager = (WifiManager) mContext.getSystemService(Context.WIFI_SERVICE);
198 initWifiConfigController(accessPoint, mode);
202 public WifiConfigController(WifiConfigUiBase parent, View view, AccessPoint accessPoint,
203 int mode, WifiManager wifiManager) {
207 mAccessPoint = accessPoint;
208 mContext = mConfigUi.getContext();
209 mWifiManager = wifiManager;
210 initWifiConfigController(accessPoint, mode);
213 private void initWifiConfigController(AccessPoint accessPoint, int mode) {
215 mAccessPointSecurity = (accessPoint == null) ? AccessPoint.SECURITY_NONE :
216 accessPoint.getSecurity();
219 final Resources res = mContext.getResources();
221 mLevels = res.getStringArray(R.array.wifi_signal);
222 if (Utils.isWifiOnly(mContext) || !mContext.getResources().getBoolean(
223 com.android.internal.R.bool.config_eap_sim_based_auth_supported)) {
224 mPhase2PeapAdapter = new ArrayAdapter<String>(
225 mContext, android.R.layout.simple_spinner_item,
226 res.getStringArray(R.array.wifi_peap_phase2_entries));
228 mPhase2PeapAdapter = new ArrayAdapter<String>(
229 mContext, android.R.layout.simple_spinner_item,
230 res.getStringArray(R.array.wifi_peap_phase2_entries_with_sim_auth));
232 mPhase2PeapAdapter.setDropDownViewResource(android.R.layout.simple_spinner_dropdown_item);
234 mPhase2FullAdapter = new ArrayAdapter<String>(
235 mContext, android.R.layout.simple_spinner_item,
236 res.getStringArray(R.array.wifi_phase2_entries));
237 mPhase2FullAdapter.setDropDownViewResource(android.R.layout.simple_spinner_dropdown_item);
239 mUnspecifiedCertString = mContext.getString(R.string.wifi_unspecified);
240 mMultipleCertSetString = mContext.getString(R.string.wifi_multiple_cert_added);
241 mUseSystemCertsString = mContext.getString(R.string.wifi_use_system_certs);
242 mDoNotProvideEapUserCertString =
243 mContext.getString(R.string.wifi_do_not_provide_eap_user_cert);
244 mDoNotValidateEapServerString =
245 mContext.getString(R.string.wifi_do_not_validate_eap_server);
247 mSsidScanButton = (ImageButton) mView.findViewById(R.id.ssid_scanner_button);
248 mPasswordScanButton = (ImageButton) mView.findViewById(R.id.password_scanner_button);
249 mDialogContainer = mView.findViewById(R.id.dialog_scrollview);
250 mIpSettingsSpinner = (Spinner) mView.findViewById(R.id.ip_settings);
251 mIpSettingsSpinner.setOnItemSelectedListener(this);
252 mProxySettingsSpinner = (Spinner) mView.findViewById(R.id.proxy_settings);
253 mProxySettingsSpinner.setOnItemSelectedListener(this);
254 mSharedCheckBox = (CheckBox) mView.findViewById(R.id.shared);
255 mMeteredSettingsSpinner = mView.findViewById(R.id.metered_settings);
256 mHiddenSettingsSpinner = mView.findViewById(R.id.hidden_settings);
257 mPrivacySettingsSpinner = mView.findViewById(R.id.privacy_settings);
258 if (mContext.getResources().getBoolean(
259 com.android.internal.R.bool.config_wifi_connected_mac_randomization_supported)) {
260 View privacySettingsLayout = mView.findViewById(R.id.privacy_settings_fields);
261 privacySettingsLayout.setVisibility(View.VISIBLE);
263 mHiddenSettingsSpinner.setOnItemSelectedListener(this);
264 mHiddenWarningView = mView.findViewById(R.id.hidden_settings_warning);
265 mHiddenWarningView.setVisibility(
266 mHiddenSettingsSpinner.getSelectedItemPosition() == NOT_HIDDEN_NETWORK
269 mSecurityInPosition = new Integer[AccessPoint.SECURITY_MAX_VAL];
271 if (mAccessPoint == null) { // new network
272 configureSecuritySpinner();
273 mConfigUi.setSubmitButton(res.getString(R.string.wifi_save));
274 mPasswordScanButton.setVisibility(View.GONE);
276 mConfigUi.setTitle(mAccessPoint.getTitle());
278 ViewGroup group = (ViewGroup) mView.findViewById(R.id.info);
280 boolean showAdvancedFields = false;
281 if (mAccessPoint.isSaved()) {
282 WifiConfiguration config = mAccessPoint.getConfig();
283 mMeteredSettingsSpinner.setSelection(config.meteredOverride);
284 mHiddenSettingsSpinner.setSelection(config.hiddenSSID
286 : NOT_HIDDEN_NETWORK);
288 final int prefMacValue =
289 WifiPrivacyPreferenceController.translateMacRandomizedValueToPrefValue(
290 config.macRandomizationSetting);
291 mPrivacySettingsSpinner.setSelection(prefMacValue);
293 if (config.getIpAssignment() == IpAssignment.STATIC) {
294 mIpSettingsSpinner.setSelection(STATIC_IP);
295 showAdvancedFields = true;
296 // Display IP address.
297 StaticIpConfiguration staticConfig = config.getStaticIpConfiguration();
298 if (staticConfig != null && staticConfig.ipAddress != null) {
299 addRow(group, R.string.wifi_ip_address,
300 staticConfig.ipAddress.getAddress().getHostAddress());
303 mIpSettingsSpinner.setSelection(DHCP);
306 mSharedCheckBox.setEnabled(config.shared);
307 if (!config.shared) {
308 showAdvancedFields = true;
311 if (config.getProxySettings() == ProxySettings.STATIC) {
312 mProxySettingsSpinner.setSelection(PROXY_STATIC);
313 showAdvancedFields = true;
314 } else if (config.getProxySettings() == ProxySettings.PAC) {
315 mProxySettingsSpinner.setSelection(PROXY_PAC);
316 showAdvancedFields = true;
318 mProxySettingsSpinner.setSelection(PROXY_NONE);
320 if (config != null && config.isPasspoint()) {
321 addRow(group, R.string.passpoint_label,
322 String.format(mContext.getString(R.string.passpoint_content),
323 config.providerFriendlyName));
327 if ((!mAccessPoint.isSaved() && !mAccessPoint.isActive()
328 && !mAccessPoint.isPasspointConfig())
329 || mMode != WifiConfigUiBase.MODE_VIEW) {
330 showSecurityFields(true /* refreshEapMethods */, true /* refreshCertificates */);
331 showIpConfigFields();
333 final CheckBox advancedTogglebox =
334 (CheckBox) mView.findViewById(R.id.wifi_advanced_togglebox);
335 mView.findViewById(R.id.wifi_advanced_toggle).setVisibility(
336 mAccessPoint.isCarrierAp() ? View.GONE : View.VISIBLE);
337 advancedTogglebox.setOnCheckedChangeListener(this);
338 advancedTogglebox.setChecked(showAdvancedFields);
339 mView.findViewById(R.id.wifi_advanced_fields)
340 .setVisibility(showAdvancedFields ? View.VISIBLE : View.GONE);
341 if (mAccessPoint.isCarrierAp()) {
342 addRow(group, R.string.wifi_carrier_connect,
343 String.format(mContext.getString(R.string.wifi_carrier_content),
344 mAccessPoint.getCarrierName()));
348 if (mMode == WifiConfigUiBase.MODE_MODIFY) {
349 mConfigUi.setSubmitButton(res.getString(R.string.wifi_save));
350 } else if (mMode == WifiConfigUiBase.MODE_CONNECT) {
351 mConfigUi.setSubmitButton(res.getString(R.string.wifi_connect));
353 final DetailedState state = mAccessPoint.getDetailedState();
354 final String signalLevel = getSignalString();
356 if ((state == null || state == DetailedState.DISCONNECTED) && signalLevel != null) {
357 mConfigUi.setSubmitButton(res.getString(R.string.wifi_connect));
360 boolean isEphemeral = mAccessPoint.isEphemeral();
361 WifiConfiguration config = mAccessPoint.getConfig();
362 String providerFriendlyName = null;
363 if (config != null && config.isPasspoint()) {
364 providerFriendlyName = config.providerFriendlyName;
366 String suggestionOrSpecifierPackageName = null;
368 && (config.fromWifiNetworkSpecifier
369 || config.fromWifiNetworkSuggestion)) {
370 suggestionOrSpecifierPackageName = config.creatorName;
372 String summary = AccessPoint.getSummary(
373 mConfigUi.getContext(), /* ssid */ null, state, isEphemeral,
374 suggestionOrSpecifierPackageName);
375 addRow(group, R.string.wifi_status, summary);
378 if (signalLevel != null) {
379 addRow(group, R.string.wifi_signal, signalLevel);
382 WifiInfo info = mAccessPoint.getInfo();
383 if (info != null && info.getTxLinkSpeedMbps() != WifiInfo.LINK_SPEED_UNKNOWN) {
384 addRow(group, R.string.tx_wifi_speed, String.format(
385 res.getString(R.string.tx_link_speed), info.getTxLinkSpeedMbps()));
388 if (info != null && info.getRxLinkSpeedMbps() != WifiInfo.LINK_SPEED_UNKNOWN) {
389 addRow(group, R.string.rx_wifi_speed, String.format(
390 res.getString(R.string.rx_link_speed), info.getRxLinkSpeedMbps()));
393 if (info != null && info.getFrequency() != -1) {
394 final int frequency = info.getFrequency();
397 if (frequency >= AccessPoint.LOWER_FREQ_24GHZ
398 && frequency < AccessPoint.HIGHER_FREQ_24GHZ) {
399 band = res.getString(R.string.wifi_band_24ghz);
400 } else if (frequency >= AccessPoint.LOWER_FREQ_5GHZ
401 && frequency < AccessPoint.HIGHER_FREQ_5GHZ) {
402 band = res.getString(R.string.wifi_band_5ghz);
404 Log.e(TAG, "Unexpected frequency " + frequency);
407 addRow(group, R.string.wifi_frequency, band);
411 addRow(group, R.string.wifi_security, mAccessPoint.getSecurityString(false));
412 mView.findViewById(R.id.ip_fields).setVisibility(View.GONE);
414 if (mAccessPoint.isSaved() || mAccessPoint.isActive()
415 || mAccessPoint.isPasspointConfig()) {
416 mConfigUi.setForgetButton(res.getString(R.string.wifi_forget));
420 if (!WifiDppUtils.isSupportEnrolleeQrCodeScanner(mContext, mAccessPointSecurity)) {
421 mPasswordScanButton.setVisibility(View.GONE);
423 mSsidScanButton.setVisibility(View.GONE);
426 if (!isSplitSystemUser()) {
427 mSharedCheckBox.setVisibility(View.GONE);
430 mConfigUi.setCancelButton(res.getString(R.string.wifi_cancel));
431 if (mConfigUi.getSubmitButton() != null) {
432 enableSubmitIfAppropriate();
435 // After done view show and hide, request focus from parent view
436 mView.findViewById(R.id.l_wifidialog).requestFocus();
440 boolean isSplitSystemUser() {
441 final UserManager userManager =
442 (UserManager) mContext.getSystemService(Context.USER_SERVICE);
443 return userManager.isSplitSystemUser();
446 private void addRow(ViewGroup group, int name, String value) {
447 View row = mConfigUi.getLayoutInflater().inflate(R.layout.wifi_dialog_row, group, false);
448 ((TextView) row.findViewById(R.id.name)).setText(name);
449 ((TextView) row.findViewById(R.id.value)).setText(value);
454 String getSignalString() {
455 if (!mAccessPoint.isReachable()) {
458 final int level = mAccessPoint.getLevel();
460 return (level > -1 && level < mLevels.length) ? mLevels[level] : null;
463 void hideForgetButton() {
464 Button forget = mConfigUi.getForgetButton();
465 if (forget == null) return;
467 forget.setVisibility(View.GONE);
470 void hideSubmitButton() {
471 Button submit = mConfigUi.getSubmitButton();
472 if (submit == null) return;
474 submit.setVisibility(View.GONE);
477 /* show submit button if password, ip and proxy settings are valid */
478 void enableSubmitIfAppropriate() {
479 Button submit = mConfigUi.getSubmitButton();
480 if (submit == null) return;
482 submit.setEnabled(isSubmittable());
485 boolean isValidPsk(String password) {
486 if (password.length() == 64 && password.matches("[0-9A-Fa-f]{64}")) {
488 } else if (password.length() >= 8 && password.length() <= 63) {
494 boolean isValidSaePassword(String password) {
495 if (password.length() >= 1 && password.length() <= 63) {
501 boolean isSubmittable() {
502 boolean enabled = false;
503 boolean passwordInvalid = false;
504 if (mPasswordView != null
505 && ((mAccessPointSecurity == AccessPoint.SECURITY_WEP
506 && mPasswordView.length() == 0)
507 || (mAccessPointSecurity == AccessPoint.SECURITY_PSK
508 && !isValidPsk(mPasswordView.getText().toString()))
509 || (mAccessPointSecurity == AccessPoint.SECURITY_SAE
510 && !isValidSaePassword(mPasswordView.getText().toString())))) {
511 passwordInvalid = true;
513 if ((mSsidView != null && mSsidView.length() == 0)
514 // If Accesspoint is not saved, apply passwordInvalid check
515 || ((mAccessPoint == null || !mAccessPoint.isSaved()) && passwordInvalid
516 // If AccessPoint is saved (modifying network) and password is changed, apply
517 // Invalid password check
518 || mAccessPoint != null && mAccessPoint.isSaved() && passwordInvalid
519 && mPasswordView.length() > 0)) {
522 enabled = ipAndProxyFieldsAreValid();
524 if ((mAccessPointSecurity == AccessPoint.SECURITY_EAP ||
525 mAccessPointSecurity == AccessPoint.SECURITY_EAP_SUITE_B)
526 && mEapCaCertSpinner != null
527 && mView.findViewById(R.id.l_ca_cert).getVisibility() != View.GONE) {
528 String caCertSelection = (String) mEapCaCertSpinner.getSelectedItem();
529 if (caCertSelection.equals(mUnspecifiedCertString)) {
530 // Disallow submit if the user has not selected a CA certificate for an EAP network
534 if (caCertSelection.equals(mUseSystemCertsString)
535 && mEapDomainView != null
536 && mView.findViewById(R.id.l_domain).getVisibility() != View.GONE
537 && TextUtils.isEmpty(mEapDomainView.getText().toString())) {
538 // Disallow submit if the user chooses to use system certificates for EAP server
539 // validation, but does not provide a domain.
543 if ((mAccessPointSecurity == AccessPoint.SECURITY_EAP ||
544 mAccessPointSecurity == AccessPoint.SECURITY_EAP_SUITE_B)
545 && mEapUserCertSpinner != null
546 && mView.findViewById(R.id.l_user_cert).getVisibility() != View.GONE
547 && mEapUserCertSpinner.getSelectedItem().equals(mUnspecifiedCertString)) {
548 // Disallow submit if the user has not selected a user certificate for an EAP network
555 void showWarningMessagesIfAppropriate() {
556 mView.findViewById(R.id.no_ca_cert_warning).setVisibility(View.GONE);
557 mView.findViewById(R.id.no_domain_warning).setVisibility(View.GONE);
558 mView.findViewById(R.id.ssid_too_long_warning).setVisibility(View.GONE);
560 if (mSsidView != null) {
561 final String ssid = mSsidView.getText().toString();
562 if (WifiUtils.isSSIDTooLong(ssid)) {
563 mView.findViewById(R.id.ssid_too_long_warning).setVisibility(View.VISIBLE);
566 if (mEapCaCertSpinner != null
567 && mView.findViewById(R.id.l_ca_cert).getVisibility() != View.GONE) {
568 String caCertSelection = (String) mEapCaCertSpinner.getSelectedItem();
569 if (caCertSelection.equals(mDoNotValidateEapServerString)) {
570 // Display warning if user chooses not to validate the EAP server with a
571 // user-supplied CA certificate in an EAP network configuration.
572 mView.findViewById(R.id.no_ca_cert_warning).setVisibility(View.VISIBLE);
574 if (caCertSelection.equals(mUseSystemCertsString)
575 && mEapDomainView != null
576 && mView.findViewById(R.id.l_domain).getVisibility() != View.GONE
577 && TextUtils.isEmpty(mEapDomainView.getText().toString())) {
578 // Display warning if user chooses to use pre-installed public CA certificates
579 // without restricting the server domain that these certificates can be used to
581 mView.findViewById(R.id.no_domain_warning).setVisibility(View.VISIBLE);
586 public WifiConfiguration getConfig() {
587 if (mMode == WifiConfigUiBase.MODE_VIEW) {
591 WifiConfiguration config = new WifiConfiguration();
593 if (mAccessPoint == null) {
594 config.SSID = AccessPoint.convertToQuotedString(
595 mSsidView.getText().toString());
596 // If the user adds a network manually, assume that it is hidden.
597 config.hiddenSSID = mHiddenSettingsSpinner.getSelectedItemPosition() == HIDDEN_NETWORK;
598 } else if (!mAccessPoint.isSaved()) {
599 config.SSID = AccessPoint.convertToQuotedString(
600 mAccessPoint.getSsidStr());
602 config.networkId = mAccessPoint.getConfig().networkId;
603 config.hiddenSSID = mAccessPoint.getConfig().hiddenSSID;
606 config.shared = mSharedCheckBox.isChecked();
608 switch (mAccessPointSecurity) {
609 case AccessPoint.SECURITY_NONE:
610 config.allowedKeyManagement.set(KeyMgmt.NONE);
613 case AccessPoint.SECURITY_WEP:
614 config.allowedKeyManagement.set(KeyMgmt.NONE);
615 config.allowedAuthAlgorithms.set(AuthAlgorithm.OPEN);
616 config.allowedAuthAlgorithms.set(AuthAlgorithm.SHARED);
617 if (mPasswordView.length() != 0) {
618 int length = mPasswordView.length();
619 String password = mPasswordView.getText().toString();
620 // WEP-40, WEP-104, and 256-bit WEP (WEP-232?)
621 if ((length == 10 || length == 26 || length == 58)
622 && password.matches("[0-9A-Fa-f]*")) {
623 config.wepKeys[0] = password;
625 config.wepKeys[0] = '"' + password + '"';
630 case AccessPoint.SECURITY_PSK:
631 config.allowedKeyManagement.set(KeyMgmt.WPA_PSK);
632 if (mPasswordView.length() != 0) {
633 String password = mPasswordView.getText().toString();
634 if (password.matches("[0-9A-Fa-f]{64}")) {
635 config.preSharedKey = password;
637 config.preSharedKey = '"' + password + '"';
642 case AccessPoint.SECURITY_EAP:
643 case AccessPoint.SECURITY_EAP_SUITE_B:
644 config.allowedKeyManagement.set(KeyMgmt.WPA_EAP);
645 config.allowedKeyManagement.set(KeyMgmt.IEEE8021X);
646 if (mAccessPointSecurity == AccessPoint.SECURITY_EAP_SUITE_B) {
647 config.allowedKeyManagement.set(KeyMgmt.SUITE_B_192);
648 config.requirePMF = true;
649 config.allowedPairwiseCiphers.set(WifiConfiguration.PairwiseCipher.GCMP_256);
650 config.allowedGroupCiphers.set(WifiConfiguration.GroupCipher.GCMP_256);
651 config.allowedGroupManagementCiphers.set(WifiConfiguration.GroupMgmtCipher
653 // allowedSuiteBCiphers will be set according to certificate type
655 config.enterpriseConfig = new WifiEnterpriseConfig();
656 int eapMethod = mEapMethodSpinner.getSelectedItemPosition();
657 int phase2Method = mPhase2Spinner.getSelectedItemPosition();
658 config.enterpriseConfig.setEapMethod(eapMethod);
661 // PEAP supports limited phase2 values
662 // Map the index from the mPhase2PeapAdapter to the one used
663 // by the API which has the full list of PEAP methods.
664 switch(phase2Method) {
665 case WIFI_PEAP_PHASE2_NONE:
666 config.enterpriseConfig.setPhase2Method(Phase2.NONE);
668 case WIFI_PEAP_PHASE2_MSCHAPV2:
669 config.enterpriseConfig.setPhase2Method(Phase2.MSCHAPV2);
671 case WIFI_PEAP_PHASE2_GTC:
672 config.enterpriseConfig.setPhase2Method(Phase2.GTC);
674 case WIFI_PEAP_PHASE2_SIM:
675 config.enterpriseConfig.setPhase2Method(Phase2.SIM);
677 case WIFI_PEAP_PHASE2_AKA:
678 config.enterpriseConfig.setPhase2Method(Phase2.AKA);
680 case WIFI_PEAP_PHASE2_AKA_PRIME:
681 config.enterpriseConfig.setPhase2Method(Phase2.AKA_PRIME);
684 Log.e(TAG, "Unknown phase2 method" + phase2Method);
689 // The default index from mPhase2FullAdapter maps to the API
690 config.enterpriseConfig.setPhase2Method(phase2Method);
694 String caCert = (String) mEapCaCertSpinner.getSelectedItem();
695 config.enterpriseConfig.setCaCertificateAliases(null);
696 config.enterpriseConfig.setCaPath(null);
697 config.enterpriseConfig.setDomainSuffixMatch(mEapDomainView.getText().toString());
698 if (caCert.equals(mUnspecifiedCertString)
699 || caCert.equals(mDoNotValidateEapServerString)) {
700 // ca_cert already set to null, so do nothing.
701 } else if (caCert.equals(mUseSystemCertsString)) {
702 config.enterpriseConfig.setCaPath(SYSTEM_CA_STORE_PATH);
703 } else if (caCert.equals(mMultipleCertSetString)) {
704 if (mAccessPoint != null) {
705 if (!mAccessPoint.isSaved()) {
706 Log.e(TAG, "Multiple certs can only be set "
707 + "when editing saved network");
709 config.enterpriseConfig.setCaCertificateAliases(
713 .getCaCertificateAliases());
716 config.enterpriseConfig.setCaCertificateAliases(new String[] {caCert});
719 // ca_cert or ca_path should not both be non-null, since we only intend to let
720 // the use either their own certificate, or the system certificates, not both.
721 // The variable that is not used must explicitly be set to null, so that a
722 // previously-set value on a saved configuration will be erased on an update.
723 if (config.enterpriseConfig.getCaCertificateAliases() != null
724 && config.enterpriseConfig.getCaPath() != null) {
725 Log.e(TAG, "ca_cert ("
726 + config.enterpriseConfig.getCaCertificateAliases()
728 + config.enterpriseConfig.getCaPath()
729 + ") should not both be non-null");
732 String clientCert = (String) mEapUserCertSpinner.getSelectedItem();
733 if (clientCert.equals(mUnspecifiedCertString)
734 || clientCert.equals(mDoNotProvideEapUserCertString)) {
735 // Note: |clientCert| should not be able to take the value |unspecifiedCert|,
736 // since we prevent such configurations from being saved.
739 config.enterpriseConfig.setClientCertificateAlias(clientCert);
740 if (eapMethod == Eap.SIM || eapMethod == Eap.AKA || eapMethod == Eap.AKA_PRIME) {
741 config.enterpriseConfig.setIdentity("");
742 config.enterpriseConfig.setAnonymousIdentity("");
743 } else if (eapMethod == Eap.PWD) {
744 config.enterpriseConfig.setIdentity(mEapIdentityView.getText().toString());
745 config.enterpriseConfig.setAnonymousIdentity("");
747 config.enterpriseConfig.setIdentity(mEapIdentityView.getText().toString());
748 config.enterpriseConfig.setAnonymousIdentity(
749 mEapAnonymousView.getText().toString());
752 if (mPasswordView.isShown()) {
753 // For security reasons, a previous password is not displayed to user.
754 // Update only if it has been changed.
755 if (mPasswordView.length() > 0) {
756 config.enterpriseConfig.setPassword(mPasswordView.getText().toString());
760 config.enterpriseConfig.setPassword(mPasswordView.getText().toString());
763 case AccessPoint.SECURITY_SAE:
764 config.allowedKeyManagement.set(KeyMgmt.SAE);
765 config.requirePMF = true;
766 if (mPasswordView.length() != 0) {
767 String password = mPasswordView.getText().toString();
768 config.preSharedKey = '"' + password + '"';
772 case AccessPoint.SECURITY_OWE:
773 config.allowedKeyManagement.set(KeyMgmt.OWE);
774 config.requirePMF = true;
781 config.setIpConfiguration(
782 new IpConfiguration(mIpAssignment, mProxySettings,
783 mStaticIpConfiguration, mHttpProxy));
784 if (mMeteredSettingsSpinner != null) {
785 config.meteredOverride = mMeteredSettingsSpinner.getSelectedItemPosition();
788 if (mPrivacySettingsSpinner != null) {
790 WifiPrivacyPreferenceController.translatePrefValueToMacRandomizedValue(
791 mPrivacySettingsSpinner.getSelectedItemPosition());
792 config.macRandomizationSetting = macValue;
798 private boolean ipAndProxyFieldsAreValid() {
800 (mIpSettingsSpinner != null
801 && mIpSettingsSpinner.getSelectedItemPosition() == STATIC_IP)
802 ? IpAssignment.STATIC
805 if (mIpAssignment == IpAssignment.STATIC) {
806 mStaticIpConfiguration = new StaticIpConfiguration();
807 int result = validateIpConfigFields(mStaticIpConfiguration);
813 final int selectedPosition = mProxySettingsSpinner.getSelectedItemPosition();
814 mProxySettings = ProxySettings.NONE;
816 if (selectedPosition == PROXY_STATIC && mProxyHostView != null) {
817 mProxySettings = ProxySettings.STATIC;
818 String host = mProxyHostView.getText().toString();
819 String portStr = mProxyPortView.getText().toString();
820 String exclusionList = mProxyExclusionListView.getText().toString();
824 port = Integer.parseInt(portStr);
825 result = ProxySelector.validate(host, portStr, exclusionList);
826 } catch (NumberFormatException e) {
827 result = R.string.proxy_error_invalid_port;
830 mHttpProxy = new ProxyInfo(host, port, exclusionList);
834 } else if (selectedPosition == PROXY_PAC && mProxyPacView != null) {
835 mProxySettings = ProxySettings.PAC;
836 CharSequence uriSequence = mProxyPacView.getText();
837 if (TextUtils.isEmpty(uriSequence)) {
840 Uri uri = Uri.parse(uriSequence.toString());
844 mHttpProxy = new ProxyInfo(uri);
849 private Inet4Address getIPv4Address(String text) {
851 return (Inet4Address) NetworkUtils.numericToInetAddress(text);
852 } catch (IllegalArgumentException | ClassCastException e) {
857 private int validateIpConfigFields(StaticIpConfiguration staticIpConfiguration) {
858 if (mIpAddressView == null) return 0;
860 String ipAddr = mIpAddressView.getText().toString();
861 if (TextUtils.isEmpty(ipAddr)) return R.string.wifi_ip_settings_invalid_ip_address;
863 Inet4Address inetAddr = getIPv4Address(ipAddr);
864 if (inetAddr == null || inetAddr.equals(Inet4Address.ANY)) {
865 return R.string.wifi_ip_settings_invalid_ip_address;
868 int networkPrefixLength = -1;
870 networkPrefixLength = Integer.parseInt(mNetworkPrefixLengthView.getText().toString());
871 if (networkPrefixLength < 0 || networkPrefixLength > 32) {
872 return R.string.wifi_ip_settings_invalid_network_prefix_length;
874 staticIpConfiguration.ipAddress = new LinkAddress(inetAddr, networkPrefixLength);
875 } catch (NumberFormatException e) {
876 // Set the hint as default after user types in ip address
877 mNetworkPrefixLengthView.setText(mConfigUi.getContext().getString(
878 R.string.wifi_network_prefix_length_hint));
879 } catch (IllegalArgumentException e) {
880 return R.string.wifi_ip_settings_invalid_ip_address;
883 String gateway = mGatewayView.getText().toString();
884 if (TextUtils.isEmpty(gateway)) {
886 //Extract a default gateway from IP address
887 InetAddress netPart = NetworkUtils.getNetworkPart(inetAddr, networkPrefixLength);
888 byte[] addr = netPart.getAddress();
889 addr[addr.length - 1] = 1;
890 mGatewayView.setText(InetAddress.getByAddress(addr).getHostAddress());
891 } catch (RuntimeException ee) {
892 } catch (java.net.UnknownHostException u) {
895 InetAddress gatewayAddr = getIPv4Address(gateway);
896 if (gatewayAddr == null) {
897 return R.string.wifi_ip_settings_invalid_gateway;
899 if (gatewayAddr.isMulticastAddress()) {
900 return R.string.wifi_ip_settings_invalid_gateway;
902 staticIpConfiguration.gateway = gatewayAddr;
905 String dns = mDns1View.getText().toString();
906 InetAddress dnsAddr = null;
908 if (TextUtils.isEmpty(dns)) {
909 //If everything else is valid, provide hint as a default option
910 mDns1View.setText(mConfigUi.getContext().getString(R.string.wifi_dns1_hint));
912 dnsAddr = getIPv4Address(dns);
913 if (dnsAddr == null) {
914 return R.string.wifi_ip_settings_invalid_dns;
916 staticIpConfiguration.dnsServers.add(dnsAddr);
919 if (mDns2View.length() > 0) {
920 dns = mDns2View.getText().toString();
921 dnsAddr = getIPv4Address(dns);
922 if (dnsAddr == null) {
923 return R.string.wifi_ip_settings_invalid_dns;
925 staticIpConfiguration.dnsServers.add(dnsAddr);
930 private void showSecurityFields(boolean refreshEapMethods, boolean refreshCertificates) {
931 if (mAccessPointSecurity == AccessPoint.SECURITY_NONE ||
932 mAccessPointSecurity == AccessPoint.SECURITY_OWE) {
933 mView.findViewById(R.id.security_fields).setVisibility(View.GONE);
936 mView.findViewById(R.id.security_fields).setVisibility(View.VISIBLE);
938 if (mPasswordView == null) {
939 mPasswordView = (TextView) mView.findViewById(R.id.password);
940 mPasswordView.addTextChangedListener(this);
941 mPasswordView.setOnEditorActionListener(this);
942 mPasswordView.setOnKeyListener(this);
943 ((CheckBox) mView.findViewById(R.id.show_password))
944 .setOnCheckedChangeListener(this);
946 if (mAccessPoint != null && mAccessPoint.isSaved()) {
947 mPasswordView.setHint(R.string.wifi_unchanged);
951 if (mAccessPointSecurity != AccessPoint.SECURITY_EAP &&
952 mAccessPointSecurity != AccessPoint.SECURITY_EAP_SUITE_B) {
953 mView.findViewById(R.id.eap).setVisibility(View.GONE);
956 mView.findViewById(R.id.eap).setVisibility(View.VISIBLE);
958 boolean initiateEnterpriseNetworkUi = false;
959 if (mEapMethodSpinner == null) {
960 initiateEnterpriseNetworkUi = true;
961 mEapMethodSpinner = (Spinner) mView.findViewById(R.id.method);
962 mEapMethodSpinner.setOnItemSelectedListener(this);
963 mPhase2Spinner = (Spinner) mView.findViewById(R.id.phase2);
964 mPhase2Spinner.setOnItemSelectedListener(this);
965 mEapCaCertSpinner = (Spinner) mView.findViewById(R.id.ca_cert);
966 mEapCaCertSpinner.setOnItemSelectedListener(this);
967 mEapDomainView = (TextView) mView.findViewById(R.id.domain);
968 mEapDomainView.addTextChangedListener(this);
969 mEapUserCertSpinner = (Spinner) mView.findViewById(R.id.user_cert);
970 mEapUserCertSpinner.setOnItemSelectedListener(this);
971 mEapIdentityView = (TextView) mView.findViewById(R.id.identity);
972 mEapAnonymousView = (TextView) mView.findViewById(R.id.anonymous);
975 if (refreshEapMethods) {
976 ArrayAdapter<CharSequence> eapMethodSpinnerAdapter;
977 if (mAccessPointSecurity == AccessPoint.SECURITY_EAP_SUITE_B) {
978 eapMethodSpinnerAdapter = getSpinnerAdapter(R.array.wifi_eap_method);
979 mEapMethodSpinner.setAdapter(eapMethodSpinnerAdapter);
980 // WAP3-Enterprise 192-bit only allows EAP method TLS
981 mEapMethodSpinner.setSelection(Eap.TLS);
982 mEapMethodSpinner.setEnabled(false);
983 } else if (Utils.isWifiOnly(mContext) || !mContext.getResources().getBoolean(
984 com.android.internal.R.bool.config_eap_sim_based_auth_supported)) {
985 eapMethodSpinnerAdapter = getSpinnerAdapter(
986 R.array.eap_method_without_sim_auth);
987 mEapMethodSpinner.setAdapter(eapMethodSpinnerAdapter);
988 mEapMethodSpinner.setEnabled(true);
990 eapMethodSpinnerAdapter = getSpinnerAdapter(R.array.wifi_eap_method);
991 mEapMethodSpinner.setAdapter(eapMethodSpinnerAdapter);
992 mEapMethodSpinner.setEnabled(true);
996 if (mAccessPointSecurity != AccessPoint.SECURITY_EAP_SUITE_B
997 && mAccessPoint != null
998 && mAccessPoint.isCarrierAp()) {
999 mEapMethodSpinner.setSelection(mAccessPoint.getCarrierApEapType());
1002 if (refreshCertificates) {
1005 Credentials.CA_CERTIFICATE,
1006 mDoNotValidateEapServerString,
1010 mEapUserCertSpinner,
1011 Credentials.USER_PRIVATE_KEY,
1012 mDoNotProvideEapUserCertString,
1017 // Modifying an existing network
1018 if (initiateEnterpriseNetworkUi && mAccessPoint != null && mAccessPoint.isSaved()) {
1019 final WifiEnterpriseConfig enterpriseConfig = mAccessPoint.getConfig().enterpriseConfig;
1020 final int eapMethod = enterpriseConfig.getEapMethod();
1021 final int phase2Method = enterpriseConfig.getPhase2Method();
1022 mEapMethodSpinner.setSelection(eapMethod);
1023 showEapFieldsByMethod(eapMethod);
1024 switch (eapMethod) {
1026 switch (phase2Method) {
1028 mPhase2Spinner.setSelection(WIFI_PEAP_PHASE2_NONE);
1030 case Phase2.MSCHAPV2:
1031 mPhase2Spinner.setSelection(WIFI_PEAP_PHASE2_MSCHAPV2);
1034 mPhase2Spinner.setSelection(WIFI_PEAP_PHASE2_GTC);
1037 mPhase2Spinner.setSelection(WIFI_PEAP_PHASE2_SIM);
1040 mPhase2Spinner.setSelection(WIFI_PEAP_PHASE2_AKA);
1042 case Phase2.AKA_PRIME:
1043 mPhase2Spinner.setSelection(WIFI_PEAP_PHASE2_AKA_PRIME);
1046 Log.e(TAG, "Invalid phase 2 method " + phase2Method);
1051 mPhase2Spinner.setSelection(phase2Method);
1054 if (!TextUtils.isEmpty(enterpriseConfig.getCaPath())) {
1055 setSelection(mEapCaCertSpinner, mUseSystemCertsString);
1057 final String[] caCerts = enterpriseConfig.getCaCertificateAliases();
1058 if (caCerts == null) {
1059 setSelection(mEapCaCertSpinner, mDoNotValidateEapServerString);
1060 } else if (caCerts.length == 1) {
1061 setSelection(mEapCaCertSpinner, caCerts[0]);
1063 // Reload the cert spinner with an extra "multiple certificates added" item.
1066 Credentials.CA_CERTIFICATE,
1067 mDoNotValidateEapServerString,
1070 setSelection(mEapCaCertSpinner, mMultipleCertSetString);
1073 mEapDomainView.setText(enterpriseConfig.getDomainSuffixMatch());
1074 final String userCert = enterpriseConfig.getClientCertificateAlias();
1075 if (TextUtils.isEmpty(userCert)) {
1076 setSelection(mEapUserCertSpinner, mDoNotProvideEapUserCertString);
1078 setSelection(mEapUserCertSpinner, userCert);
1080 mEapIdentityView.setText(enterpriseConfig.getIdentity());
1081 mEapAnonymousView.setText(enterpriseConfig.getAnonymousIdentity());
1083 showEapFieldsByMethod(mEapMethodSpinner.getSelectedItemPosition());
1088 * EAP-PWD valid fields include
1091 * EAP-PEAP valid fields include
1092 * phase2: MSCHAPV2, GTC, SIM, AKA, AKA'
1095 * anonymous_identity
1096 * password (not required for SIM, AKA, AKA')
1097 * EAP-TLS valid fields include
1102 * EAP-TTLS valid fields include
1103 * phase2: PAP, MSCHAP, MSCHAPV2, GTC
1106 * anonymous_identity
1109 private void showEapFieldsByMethod(int eapMethod) {
1111 mView.findViewById(R.id.l_method).setVisibility(View.VISIBLE);
1112 mView.findViewById(R.id.l_identity).setVisibility(View.VISIBLE);
1113 mView.findViewById(R.id.l_domain).setVisibility(View.VISIBLE);
1115 // Defaults for most of the EAP methods and over-riden by
1116 // by certain EAP methods
1117 mView.findViewById(R.id.l_ca_cert).setVisibility(View.VISIBLE);
1118 mView.findViewById(R.id.password_layout).setVisibility(View.VISIBLE);
1119 mView.findViewById(R.id.show_password_layout).setVisibility(View.VISIBLE);
1121 Context context = mConfigUi.getContext();
1122 switch (eapMethod) {
1123 case WIFI_EAP_METHOD_PWD:
1124 setPhase2Invisible();
1125 setCaCertInvisible();
1126 setDomainInvisible();
1127 setAnonymousIdentInvisible();
1128 setUserCertInvisible();
1130 case WIFI_EAP_METHOD_TLS:
1131 mView.findViewById(R.id.l_user_cert).setVisibility(View.VISIBLE);
1132 setPhase2Invisible();
1133 setAnonymousIdentInvisible();
1134 setPasswordInvisible();
1136 case WIFI_EAP_METHOD_PEAP:
1137 // Reset adapter if needed
1138 if (mPhase2Adapter != mPhase2PeapAdapter) {
1139 mPhase2Adapter = mPhase2PeapAdapter;
1140 mPhase2Spinner.setAdapter(mPhase2Adapter);
1142 mView.findViewById(R.id.l_phase2).setVisibility(View.VISIBLE);
1143 mView.findViewById(R.id.l_anonymous).setVisibility(View.VISIBLE);
1145 setUserCertInvisible();
1147 case WIFI_EAP_METHOD_TTLS:
1148 // Reset adapter if needed
1149 if (mPhase2Adapter != mPhase2FullAdapter) {
1150 mPhase2Adapter = mPhase2FullAdapter;
1151 mPhase2Spinner.setAdapter(mPhase2Adapter);
1153 mView.findViewById(R.id.l_phase2).setVisibility(View.VISIBLE);
1154 mView.findViewById(R.id.l_anonymous).setVisibility(View.VISIBLE);
1155 setUserCertInvisible();
1157 case WIFI_EAP_METHOD_SIM:
1158 case WIFI_EAP_METHOD_AKA:
1159 case WIFI_EAP_METHOD_AKA_PRIME:
1160 setPhase2Invisible();
1161 setAnonymousIdentInvisible();
1162 setCaCertInvisible();
1163 setDomainInvisible();
1164 setUserCertInvisible();
1165 setPasswordInvisible();
1166 setIdentityInvisible();
1167 if (mAccessPoint != null && mAccessPoint.isCarrierAp()) {
1168 setEapMethodInvisible();
1173 if (mView.findViewById(R.id.l_ca_cert).getVisibility() != View.GONE) {
1174 String eapCertSelection = (String) mEapCaCertSpinner.getSelectedItem();
1175 if (eapCertSelection.equals(mDoNotValidateEapServerString)
1176 || eapCertSelection.equals(mUnspecifiedCertString)) {
1177 // Domain suffix matching is not relevant if the user hasn't chosen a CA
1178 // certificate yet, or chooses not to validate the EAP server.
1179 setDomainInvisible();
1184 private void showPeapFields() {
1185 int phase2Method = mPhase2Spinner.getSelectedItemPosition();
1186 if (phase2Method == WIFI_PEAP_PHASE2_SIM || phase2Method == WIFI_PEAP_PHASE2_AKA
1187 || phase2Method == WIFI_PEAP_PHASE2_AKA_PRIME) {
1188 mEapIdentityView.setText("");
1189 mView.findViewById(R.id.l_identity).setVisibility(View.GONE);
1190 setPasswordInvisible();
1192 mView.findViewById(R.id.l_identity).setVisibility(View.VISIBLE);
1193 mView.findViewById(R.id.l_anonymous).setVisibility(View.VISIBLE);
1194 mView.findViewById(R.id.password_layout).setVisibility(View.VISIBLE);
1195 mView.findViewById(R.id.show_password_layout).setVisibility(View.VISIBLE);
1199 private void setIdentityInvisible() {
1200 mView.findViewById(R.id.l_identity).setVisibility(View.GONE);
1201 mPhase2Spinner.setSelection(Phase2.NONE);
1204 private void setPhase2Invisible() {
1205 mView.findViewById(R.id.l_phase2).setVisibility(View.GONE);
1206 mPhase2Spinner.setSelection(Phase2.NONE);
1209 private void setCaCertInvisible() {
1210 mView.findViewById(R.id.l_ca_cert).setVisibility(View.GONE);
1211 setSelection(mEapCaCertSpinner, mUnspecifiedCertString);
1214 private void setDomainInvisible() {
1215 mView.findViewById(R.id.l_domain).setVisibility(View.GONE);
1216 mEapDomainView.setText("");
1219 private void setUserCertInvisible() {
1220 mView.findViewById(R.id.l_user_cert).setVisibility(View.GONE);
1221 setSelection(mEapUserCertSpinner, mUnspecifiedCertString);
1224 private void setAnonymousIdentInvisible() {
1225 mView.findViewById(R.id.l_anonymous).setVisibility(View.GONE);
1226 mEapAnonymousView.setText("");
1229 private void setPasswordInvisible() {
1230 mPasswordView.setText("");
1231 mView.findViewById(R.id.password_layout).setVisibility(View.GONE);
1232 mView.findViewById(R.id.show_password_layout).setVisibility(View.GONE);
1235 private void setEapMethodInvisible() {
1236 mView.findViewById(R.id.eap).setVisibility(View.GONE);
1239 private void showIpConfigFields() {
1240 WifiConfiguration config = null;
1242 mView.findViewById(R.id.ip_fields).setVisibility(View.VISIBLE);
1244 if (mAccessPoint != null && mAccessPoint.isSaved()) {
1245 config = mAccessPoint.getConfig();
1248 if (mIpSettingsSpinner.getSelectedItemPosition() == STATIC_IP) {
1249 mView.findViewById(R.id.staticip).setVisibility(View.VISIBLE);
1250 if (mIpAddressView == null) {
1251 mIpAddressView = (TextView) mView.findViewById(R.id.ipaddress);
1252 mIpAddressView.addTextChangedListener(this);
1253 mGatewayView = (TextView) mView.findViewById(R.id.gateway);
1254 mGatewayView.addTextChangedListener(this);
1255 mNetworkPrefixLengthView = (TextView) mView.findViewById(
1256 R.id.network_prefix_length);
1257 mNetworkPrefixLengthView.addTextChangedListener(this);
1258 mDns1View = (TextView) mView.findViewById(R.id.dns1);
1259 mDns1View.addTextChangedListener(this);
1260 mDns2View = (TextView) mView.findViewById(R.id.dns2);
1261 mDns2View.addTextChangedListener(this);
1263 if (config != null) {
1264 StaticIpConfiguration staticConfig = config.getStaticIpConfiguration();
1265 if (staticConfig != null) {
1266 if (staticConfig.ipAddress != null) {
1267 mIpAddressView.setText(
1268 staticConfig.ipAddress.getAddress().getHostAddress());
1269 mNetworkPrefixLengthView.setText(Integer.toString(staticConfig.ipAddress
1270 .getNetworkPrefixLength()));
1273 if (staticConfig.gateway != null) {
1274 mGatewayView.setText(staticConfig.gateway.getHostAddress());
1277 Iterator<InetAddress> dnsIterator = staticConfig.dnsServers.iterator();
1278 if (dnsIterator.hasNext()) {
1279 mDns1View.setText(dnsIterator.next().getHostAddress());
1281 if (dnsIterator.hasNext()) {
1282 mDns2View.setText(dnsIterator.next().getHostAddress());
1287 mView.findViewById(R.id.staticip).setVisibility(View.GONE);
1291 private void showProxyFields() {
1292 WifiConfiguration config = null;
1294 mView.findViewById(R.id.proxy_settings_fields).setVisibility(View.VISIBLE);
1296 if (mAccessPoint != null && mAccessPoint.isSaved()) {
1297 config = mAccessPoint.getConfig();
1300 if (mProxySettingsSpinner.getSelectedItemPosition() == PROXY_STATIC) {
1301 setVisibility(R.id.proxy_warning_limited_support, View.VISIBLE);
1302 setVisibility(R.id.proxy_fields, View.VISIBLE);
1303 setVisibility(R.id.proxy_pac_field, View.GONE);
1304 if (mProxyHostView == null) {
1305 mProxyHostView = (TextView) mView.findViewById(R.id.proxy_hostname);
1306 mProxyHostView.addTextChangedListener(this);
1307 mProxyPortView = (TextView) mView.findViewById(R.id.proxy_port);
1308 mProxyPortView.addTextChangedListener(this);
1309 mProxyExclusionListView = (TextView) mView.findViewById(R.id.proxy_exclusionlist);
1310 mProxyExclusionListView.addTextChangedListener(this);
1312 if (config != null) {
1313 ProxyInfo proxyProperties = config.getHttpProxy();
1314 if (proxyProperties != null) {
1315 mProxyHostView.setText(proxyProperties.getHost());
1316 mProxyPortView.setText(Integer.toString(proxyProperties.getPort()));
1317 mProxyExclusionListView.setText(proxyProperties.getExclusionListAsString());
1320 } else if (mProxySettingsSpinner.getSelectedItemPosition() == PROXY_PAC) {
1321 setVisibility(R.id.proxy_warning_limited_support, View.GONE);
1322 setVisibility(R.id.proxy_fields, View.GONE);
1323 setVisibility(R.id.proxy_pac_field, View.VISIBLE);
1325 if (mProxyPacView == null) {
1326 mProxyPacView = (TextView) mView.findViewById(R.id.proxy_pac);
1327 mProxyPacView.addTextChangedListener(this);
1329 if (config != null) {
1330 ProxyInfo proxyInfo = config.getHttpProxy();
1331 if (proxyInfo != null) {
1332 mProxyPacView.setText(proxyInfo.getPacFileUrl().toString());
1336 setVisibility(R.id.proxy_warning_limited_support, View.GONE);
1337 setVisibility(R.id.proxy_fields, View.GONE);
1338 setVisibility(R.id.proxy_pac_field, View.GONE);
1342 private void setVisibility(int id, int visibility) {
1343 final View v = mView.findViewById(id);
1345 v.setVisibility(visibility);
1350 KeyStore getKeyStore() {
1351 return KeyStore.getInstance();
1354 private void loadCertificates(
1357 String noCertificateString,
1358 boolean showMultipleCerts,
1359 boolean showUsePreinstalledCertOption) {
1360 final Context context = mConfigUi.getContext();
1362 ArrayList<String> certs = new ArrayList<String>();
1363 certs.add(mUnspecifiedCertString);
1364 if (showMultipleCerts) {
1365 certs.add(mMultipleCertSetString);
1367 if (showUsePreinstalledCertOption) {
1368 certs.add(mUseSystemCertsString);
1372 Arrays.asList(getKeyStore().list(prefix, android.os.Process.WIFI_UID)));
1373 } catch (Exception e) {
1374 Log.e(TAG, "can't get the certificate list from KeyStore");
1377 if (mAccessPointSecurity != AccessPoint.SECURITY_EAP_SUITE_B) {
1378 certs.add(noCertificateString);
1381 // If there are only mUnspecifiedCertString and one item to select, only shows the item
1382 if (certs.size() == 2) {
1383 certs.remove(mUnspecifiedCertString);
1384 spinner.setEnabled(false);
1386 spinner.setEnabled(true);
1389 final ArrayAdapter<String> adapter = new ArrayAdapter<String>(
1390 context, android.R.layout.simple_spinner_item,
1391 certs.toArray(new String[certs.size()]));
1392 adapter.setDropDownViewResource(android.R.layout.simple_spinner_dropdown_item);
1393 spinner.setAdapter(adapter);
1396 private void setSelection(Spinner spinner, String value) {
1397 if (value != null) {
1398 @SuppressWarnings("unchecked")
1399 ArrayAdapter<String> adapter = (ArrayAdapter<String>) spinner.getAdapter();
1400 for (int i = adapter.getCount() - 1; i >= 0; --i) {
1401 if (value.equals(adapter.getItem(i))) {
1402 spinner.setSelection(i);
1409 public int getMode() {
1414 public void afterTextChanged(Editable s) {
1415 ThreadUtils.postOnMainThread(() -> {
1416 showWarningMessagesIfAppropriate();
1417 enableSubmitIfAppropriate();
1422 public void beforeTextChanged(CharSequence s, int start, int count, int after) {
1423 // work done in afterTextChanged
1427 public void onTextChanged(CharSequence s, int start, int before, int count) {
1428 // work done in afterTextChanged
1432 public boolean onEditorAction(TextView textView, int id, KeyEvent keyEvent) {
1433 if (textView == mPasswordView) {
1434 if (id == EditorInfo.IME_ACTION_DONE && isSubmittable()) {
1435 mConfigUi.dispatchSubmit();
1443 public boolean onKey(View view, int keyCode, KeyEvent keyEvent) {
1444 if (view == mPasswordView) {
1445 if (keyCode == KeyEvent.KEYCODE_ENTER && isSubmittable()) {
1446 mConfigUi.dispatchSubmit();
1454 public void onCheckedChanged(CompoundButton view, boolean isChecked) {
1455 if (view.getId() == R.id.show_password) {
1456 int pos = mPasswordView.getSelectionEnd();
1457 mPasswordView.setInputType(InputType.TYPE_CLASS_TEXT
1458 | (isChecked ? InputType.TYPE_TEXT_VARIATION_VISIBLE_PASSWORD
1459 : InputType.TYPE_TEXT_VARIATION_PASSWORD));
1461 ((EditText) mPasswordView).setSelection(pos);
1463 } else if (view.getId() == R.id.wifi_advanced_togglebox) {
1464 final View advancedToggle = mView.findViewById(R.id.wifi_advanced_toggle);
1465 final int toggleVisibility;
1468 toggleVisibility = View.VISIBLE;
1469 stringID = R.string.wifi_advanced_toggle_description_expanded;
1471 toggleVisibility = View.GONE;
1472 stringID = R.string.wifi_advanced_toggle_description_collapsed;
1474 mView.findViewById(R.id.wifi_advanced_fields).setVisibility(toggleVisibility);
1475 advancedToggle.setContentDescription(mContext.getString(stringID));
1480 public void onItemSelected(AdapterView<?> parent, View view, int position, long id) {
1481 if (parent == mSecuritySpinner) {
1482 // Convert menu position to actual Wi-Fi security type
1483 mAccessPointSecurity = mSecurityInPosition[position];
1484 showSecurityFields(true /* refreshEapMethods */, true /* refreshCertificates */);
1486 if (WifiDppUtils.isSupportEnrolleeQrCodeScanner(mContext, mAccessPointSecurity)) {
1487 mSsidScanButton.setVisibility(View.VISIBLE);
1489 mSsidScanButton.setVisibility(View.GONE);
1491 } else if (parent == mEapMethodSpinner) {
1492 showSecurityFields(false /* refreshEapMethods */, true /* refreshCertificates */);
1493 } else if (parent == mEapCaCertSpinner) {
1494 showSecurityFields(false /* refreshEapMethods */, false /* refreshCertificates */);
1495 } else if (parent == mPhase2Spinner
1496 && mEapMethodSpinner.getSelectedItemPosition() == WIFI_EAP_METHOD_PEAP) {
1498 } else if (parent == mProxySettingsSpinner) {
1500 } else if (parent == mHiddenSettingsSpinner) {
1501 mHiddenWarningView.setVisibility(
1502 position == NOT_HIDDEN_NETWORK
1505 if (position == HIDDEN_NETWORK) {
1506 mDialogContainer.post(() -> {
1507 mDialogContainer.fullScroll(View.FOCUS_DOWN);
1511 showIpConfigFields();
1513 showWarningMessagesIfAppropriate();
1514 enableSubmitIfAppropriate();
1518 public void onNothingSelected(AdapterView<?> parent) {
1523 * Make the characters of the password visible if show_password is checked.
1525 public void updatePassword() {
1526 TextView passwdView = (TextView) mView.findViewById(R.id.password);
1527 passwdView.setInputType(InputType.TYPE_CLASS_TEXT
1528 | (((CheckBox) mView.findViewById(R.id.show_password)).isChecked()
1529 ? InputType.TYPE_TEXT_VARIATION_VISIBLE_PASSWORD
1530 : InputType.TYPE_TEXT_VARIATION_PASSWORD));
1533 public AccessPoint getAccessPoint() {
1534 return mAccessPoint;
1537 private void configureSecuritySpinner() {
1538 mConfigUi.setTitle(R.string.wifi_add_network);
1540 mSsidView = (TextView) mView.findViewById(R.id.ssid);
1541 mSsidView.addTextChangedListener(this);
1542 mSecuritySpinner = ((Spinner) mView.findViewById(R.id.security));
1543 mSecuritySpinner.setOnItemSelectedListener(this);
1545 ArrayAdapter<String> spinnerAdapter = new ArrayAdapter<String>(mContext,
1546 android.R.layout.simple_spinner_item, android.R.id.text1);
1547 spinnerAdapter.setDropDownViewResource(android.R.layout.simple_spinner_dropdown_item);
1548 mSecuritySpinner.setAdapter(spinnerAdapter);
1551 // Populate the Wi-Fi security spinner with the various supported key management types
1552 spinnerAdapter.add(mContext.getString(R.string.wifi_security_none));
1553 mSecurityInPosition[idx++] = AccessPoint.SECURITY_NONE;
1554 if (mWifiManager.isEnhancedOpenSupported()) {
1555 spinnerAdapter.add(mContext.getString(R.string.wifi_security_owe));
1556 mSecurityInPosition[idx++] = AccessPoint.SECURITY_OWE;
1558 spinnerAdapter.add(mContext.getString(R.string.wifi_security_wep));
1559 mSecurityInPosition[idx++] = AccessPoint.SECURITY_WEP;
1560 spinnerAdapter.add(mContext.getString(R.string.wifi_security_wpa_wpa2));
1561 mSecurityInPosition[idx++] = AccessPoint.SECURITY_PSK;
1562 if (mWifiManager.isWpa3SaeSupported()) {
1563 spinnerAdapter.add(mContext.getString(R.string.wifi_security_sae));
1564 mSecurityInPosition[idx++] = AccessPoint.SECURITY_SAE;
1566 spinnerAdapter.add(mContext.getString(R.string.wifi_security_eap));
1567 mSecurityInPosition[idx++] = AccessPoint.SECURITY_EAP;
1568 if (mWifiManager.isWpa3SuiteBSupported()) {
1569 spinnerAdapter.add(mContext.getString(R.string.wifi_security_eap_suiteb));
1570 mSecurityInPosition[idx++] = AccessPoint.SECURITY_EAP_SUITE_B;
1573 spinnerAdapter.notifyDataSetChanged();
1575 mView.findViewById(R.id.type).setVisibility(View.VISIBLE);
1577 showIpConfigFields();
1579 mView.findViewById(R.id.wifi_advanced_toggle).setVisibility(View.VISIBLE);
1580 // Hidden option can be changed only when the user adds a network manually.
1581 mView.findViewById(R.id.hidden_settings_field).setVisibility(View.VISIBLE);
1582 ((CheckBox) mView.findViewById(R.id.wifi_advanced_togglebox))
1583 .setOnCheckedChangeListener(this);
1586 private ArrayAdapter<CharSequence> getSpinnerAdapter(
1587 int contentStringArrayResId) {
1588 final String[] eapMethods = mContext.getResources().getStringArray(
1589 contentStringArrayResId);
1590 final ArrayAdapter<CharSequence> spinnerAdapter = new ArrayAdapter<>(mContext,
1591 android.R.layout.simple_spinner_item, eapMethods);
1592 spinnerAdapter.setDropDownViewResource(
1593 android.R.layout.simple_spinner_dropdown_item);
1594 return spinnerAdapter;