static gboolean std_ask_user (const char *vpn_name, const char *prompt, gboolean need_password, const char *existing_password, char **out_new_password, gboolean need_user_certpass, const char *existing_user_certpass, char **out_new_user_certpass, gboolean need_machine_certpass, const char *existing_machine_certpass, char **out_new_machine_certpass) { NMAVpnPasswordDialog *dialog; gboolean success = FALSE; g_return_val_if_fail (vpn_name != NULL, FALSE); g_return_val_if_fail (prompt != NULL, FALSE); g_return_val_if_fail (out_new_password != NULL, FALSE); g_return_val_if_fail (out_new_user_certpass != NULL, FALSE); g_return_val_if_fail (out_new_machine_certpass != NULL, FALSE); gtk_init (NULL, NULL); dialog = NMA_VPN_PASSWORD_DIALOG (nma_vpn_password_dialog_new (_("Authenticate VPN"), prompt, NULL)); /* pre-fill dialog with existing passwords */ nma_vpn_password_dialog_set_show_password (dialog, need_password); if (need_password) nma_vpn_password_dialog_set_password (dialog, existing_password); nma_vpn_password_dialog_set_show_password_secondary (dialog, need_user_certpass); if (need_user_certpass) { nma_vpn_password_dialog_set_password_secondary_label (dialog, _("_User Certificate password:"******"_Machine Certificate password:")); nma_vpn_password_dialog_set_password_ternary (dialog, existing_machine_certpass); } gtk_widget_show (GTK_WIDGET (dialog)); if (nma_vpn_password_dialog_run_and_block (dialog)) { if (need_password) *out_new_password = g_strdup (nma_vpn_password_dialog_get_password (dialog)); if (need_user_certpass) *out_new_user_certpass = g_strdup (nma_vpn_password_dialog_get_password_secondary (dialog)); if (need_machine_certpass) *out_new_machine_certpass = g_strdup (nma_vpn_password_dialog_get_password_ternary (dialog)); success = TRUE; } gtk_widget_destroy (GTK_WIDGET (dialog)); return success; }
static gboolean get_secrets (const char *vpn_uuid, const char *vpn_name, gboolean retry, gboolean allow_interaction, gboolean external_ui_mode, const char *in_pw, char **out_pw, NMSettingSecretFlags pw_flags) { NMAVpnPasswordDialog *dialog; char *prompt, *pw = NULL; const char *new_password = NULL; g_return_val_if_fail (vpn_uuid != NULL, FALSE); g_return_val_if_fail (vpn_name != NULL, FALSE); g_return_val_if_fail (out_pw != NULL, FALSE); g_return_val_if_fail (*out_pw == NULL, FALSE); /* Get the existing secret, if any */ if ( !(pw_flags & NM_SETTING_SECRET_FLAG_NOT_SAVED) && !(pw_flags & NM_SETTING_SECRET_FLAG_NOT_REQUIRED)) { if (in_pw) pw = g_strdup (in_pw); else pw = keyring_lookup_secret (vpn_uuid, NM_FORTISSLVPN_KEY_PASSWORD); } /* Don't ask if the passwords is unused */ if (pw_flags & NM_SETTING_SECRET_FLAG_NOT_REQUIRED) { g_free (pw); return TRUE; } /* Otherwise, we have no saved password, or the password flags indicated * that the password should never be saved. */ prompt = g_strdup_printf (_("You need to authenticate to access the Virtual Private Network “%s”."), vpn_name); if (external_ui_mode) { GKeyFile *keyfile; keyfile = g_key_file_new (); g_key_file_set_integer (keyfile, UI_KEYFILE_GROUP, "Version", 2); g_key_file_set_string (keyfile, UI_KEYFILE_GROUP, "Description", prompt); g_key_file_set_string (keyfile, UI_KEYFILE_GROUP, "Title", _("Authenticate VPN")); keyfile_add_entry_info (keyfile, NM_FORTISSLVPN_KEY_PASSWORD, pw ? pw : "", _("Password:"******"Authenticate VPN"), prompt, NULL); nma_vpn_password_dialog_set_show_password_secondary (dialog, FALSE); /* pre-fill dialog with the password */ if (pw && !(pw_flags & NM_SETTING_SECRET_FLAG_NOT_SAVED)) nma_vpn_password_dialog_set_password (dialog, pw); gtk_widget_show (GTK_WIDGET (dialog)); if (nma_vpn_password_dialog_run_and_block (dialog)) { new_password = nma_vpn_password_dialog_get_password (dialog); if (new_password) *out_pw = g_strdup (new_password); } gtk_widget_hide (GTK_WIDGET (dialog)); gtk_widget_destroy (GTK_WIDGET (dialog)); out: g_free (prompt); return TRUE; }