office-gobmx/uui/source/iahndl-authentication.cxx
Thomas Arnhold ba0a57702c remove OUString wrap for string literals
For some functions and all kinds of Exceptions.

CannotConvertException
CloseVetoException
DisposedException
EmptyUndoStackException
ErrorCodeIOException
Exception
GridInvalidDataException
GridInvalidModelException
IOException
IllegalAccessException
IllegalArgumentException
IllegalTypeException
IndexOutOfBoundsException
NoMasterException
NoSuchElementException
NoSupportException
PropertyVetoException
RuntimeException
SAXException
ScannerException
StorageWrappedTargetException
UnsupportedFlavorException
VetoException
WrappedTargetException
ZipIOException
throwGenericSQLException
throwIllegallArgumentException

createInstance
createInstanceWithContext
forName
getByName
getPackageManager
getPropertyValue
getUnpackedValueOrDefault
getValueByName
hasPropertyByName
openKey
setName
setPropertyValue
supportsService

bash command:

for i in `cat list`; do git grep "$i\s*(\s*OUString(\s*\"" -- '*.[hc]xx'
	| cut -d ':' -f1 | sort -u
	| xargs sed -i
		-e "s/\(\<$i\s*(\)\s*OUString(\s*\(\"[^\")\\]*\"\)\s*)\s*/\1\2/g"
		-e "s/\($i.*\)\"+ /\1\" + /g";
done

Change-Id: Iaf8e641b0abf28c082906014f87a183517630535
Reviewed-on: https://gerrit.libreoffice.org/4624
Tested-by: LibreOffice gerrit bot <gerrit@libreoffice.org>
Reviewed-by: Thomas Arnhold <thomas@arnhold.org>
Tested-by: Thomas Arnhold <thomas@arnhold.org>
2013-06-29 21:52:54 +00:00

758 lines
27 KiB
C++

/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- */
/*
* This file is part of the LibreOffice project.
*
* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/.
*
* This file incorporates work covered by the following license notice:
*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed
* with this work for additional information regarding copyright
* ownership. The ASF licenses this file to you under the Apache
* License, Version 2.0 (the "License"); you may not use this file
* except in compliance with the License. You may obtain a copy of
* the License at http://www.apache.org/licenses/LICENSE-2.0 .
*/
#include "comphelper/processfactory.hxx"
#include "com/sun/star/task/DocumentPasswordRequest.hpp"
#include "com/sun/star/task/DocumentPasswordRequest2.hpp"
#include "com/sun/star/task/DocumentMSPasswordRequest.hpp"
#include "com/sun/star/task/DocumentMSPasswordRequest2.hpp"
#include "com/sun/star/task/MasterPasswordRequest.hpp"
#include "com/sun/star/task/XInteractionAbort.hpp"
#include "com/sun/star/task/XInteractionPassword.hpp"
#include "com/sun/star/task/XInteractionPassword2.hpp"
#include "com/sun/star/task/XInteractionRetry.hpp"
#include "com/sun/star/ucb/XInteractionSupplyAuthentication2.hpp"
#include "com/sun/star/ucb/URLAuthenticationRequest.hpp"
#include "osl/diagnose.h"
#include "rtl/digest.h"
#include "osl/mutex.hxx"
#include "tools/errcode.hxx"
#include "vcl/msgbox.hxx"
#include "vcl/abstdlg.hxx"
#include "vcl/svapp.hxx"
#include "ids.hrc"
#include "getcontinuations.hxx"
#include "passwordcontainer.hxx"
#include "loginerr.hxx"
#include "logindlg.hxx"
#include "masterpasscrtdlg.hxx"
#include "masterpassworddlg.hxx"
#include "passworddlg.hxx"
#include "iahndl.hxx"
#include <boost/scoped_ptr.hpp>
using namespace com::sun::star;
namespace {
void
executeLoginDialog(
Window * pParent,
LoginErrorInfo & rInfo,
OUString const & rRealm)
SAL_THROW((uno::RuntimeException))
{
try
{
SolarMutexGuard aGuard;
bool bAccount = (rInfo.GetFlags() & LOGINERROR_FLAG_MODIFY_ACCOUNT) != 0;
bool bSavePassword = rInfo.GetCanRememberPassword();
bool bCanUseSysCreds = rInfo.GetCanUseSystemCredentials();
sal_uInt16 nFlags = 0;
if (rInfo.GetPath().Len() == 0)
nFlags |= LF_NO_PATH;
if (rInfo.GetErrorText().Len() == 0)
nFlags |= LF_NO_ERRORTEXT;
if (!bAccount)
nFlags |= LF_NO_ACCOUNT;
if (!(rInfo.GetFlags() & LOGINERROR_FLAG_MODIFY_USER_NAME))
nFlags |= LF_USERNAME_READONLY;
if (!bSavePassword)
nFlags |= LF_NO_SAVEPASSWORD;
if (!bCanUseSysCreds)
nFlags |= LF_NO_USESYSCREDS;
boost::scoped_ptr< ResMgr > xManager(ResMgr::CreateResMgr("uui"));
boost::scoped_ptr< LoginDialog > xDialog(
new LoginDialog( pParent, nFlags, rInfo.GetServer(), rRealm, xManager.get()));
if (rInfo.GetErrorText().Len() != 0)
xDialog->SetErrorText(rInfo.GetErrorText());
xDialog->SetName(rInfo.GetUserName());
if (bAccount)
xDialog->ClearAccount();
else
xDialog->ClearPassword();
xDialog->SetPassword(rInfo.GetPassword());
if (bSavePassword)
{
xDialog->SetSavePasswordText(
ResId(rInfo.GetIsRememberPersistent()
? RID_SAVE_PASSWORD
: RID_KEEP_PASSWORD,
*xManager.get()));
xDialog->SetSavePassword(rInfo.GetIsRememberPassword());
}
if ( bCanUseSysCreds )
xDialog->SetUseSystemCredentials( rInfo.GetIsUseSystemCredentials() );
rInfo.SetResult(xDialog->Execute() == RET_OK ? ERRCODE_BUTTON_OK :
ERRCODE_BUTTON_CANCEL);
rInfo.SetUserName(xDialog->GetName());
rInfo.SetPassword(xDialog->GetPassword());
rInfo.SetAccount(xDialog->GetAccount());
rInfo.SetIsRememberPassword(xDialog->IsSavePassword());
if ( bCanUseSysCreds )
rInfo.SetIsUseSystemCredentials( xDialog->IsUseSystemCredentials() );
}
catch (std::bad_alloc const &)
{
throw uno::RuntimeException("out of memory",
uno::Reference< uno::XInterface >());
}
}
void getRememberModes(
uno::Sequence< ucb::RememberAuthentication > const & rRememberModes,
ucb::RememberAuthentication & rPreferredMode,
ucb::RememberAuthentication & rAlternateMode )
{
sal_Int32 nCount = rRememberModes.getLength();
OSL_ENSURE( (nCount > 0) && (nCount < 4),
"ucb::RememberAuthentication sequence size mismatch!" );
if ( nCount == 1 )
{
rPreferredMode = rAlternateMode = rRememberModes[ 0 ];
return;
}
else
{
bool bHasRememberModeSession = false;
bool bHasRememberModePersistent = false;
for (sal_Int32 i = 0; i < nCount; ++i)
{
switch ( rRememberModes[i] )
{
case ucb::RememberAuthentication_NO:
break;
case ucb::RememberAuthentication_SESSION:
bHasRememberModeSession = true;
break;
case ucb::RememberAuthentication_PERSISTENT:
bHasRememberModePersistent = true;
break;
default:
OSL_TRACE( "Unsupported RememberAuthentication value" );
break;
}
}
if (bHasRememberModePersistent)
{
rPreferredMode = ucb::RememberAuthentication_PERSISTENT;
if (bHasRememberModeSession)
rAlternateMode = ucb::RememberAuthentication_SESSION;
else
rAlternateMode = ucb::RememberAuthentication_NO;
}
else
{
rPreferredMode = ucb::RememberAuthentication_SESSION;
rAlternateMode = ucb::RememberAuthentication_NO;
}
}
}
void
handleAuthenticationRequest_(
Window * pParent,
uno::Reference< task::XInteractionHandler2 > const & xIH,
uno::Reference< uno::XComponentContext > const & xContext,
ucb::AuthenticationRequest const & rRequest,
uno::Sequence< uno::Reference< task::XInteractionContinuation > > const &
rContinuations,
const OUString & rURL)
SAL_THROW((uno::RuntimeException))
{
uno::Reference< task::XInteractionRetry > xRetry;
uno::Reference< task::XInteractionAbort > xAbort;
uno::Reference< ucb::XInteractionSupplyAuthentication >
xSupplyAuthentication;
uno::Reference< ucb::XInteractionSupplyAuthentication2 >
xSupplyAuthentication2;
getContinuations(rContinuations, &xRetry, &xAbort, &xSupplyAuthentication);
if (xSupplyAuthentication.is())
xSupplyAuthentication2.set(xSupplyAuthentication, uno::UNO_QUERY);
//////////////////////////
// First, try to obtain credentials from password container service.
uui::PasswordContainerHelper aPwContainerHelper(xContext);
if (aPwContainerHelper.handleAuthenticationRequest(rRequest,
xSupplyAuthentication,
rURL,
xIH))
{
xSupplyAuthentication->select();
return;
}
//////////////////////////
// Second, try to obtain credentials from user via password dialog.
ucb::RememberAuthentication eDefaultRememberMode
= ucb::RememberAuthentication_SESSION;
ucb::RememberAuthentication ePreferredRememberMode
= eDefaultRememberMode;
ucb::RememberAuthentication eAlternateRememberMode
= ucb::RememberAuthentication_NO;
if (xSupplyAuthentication.is())
{
getRememberModes(
xSupplyAuthentication->getRememberPasswordModes(
eDefaultRememberMode),
ePreferredRememberMode,
eAlternateRememberMode);
}
sal_Bool bCanUseSystemCredentials;
sal_Bool bDefaultUseSystemCredentials;
if (xSupplyAuthentication2.is())
{
bCanUseSystemCredentials
= xSupplyAuthentication2->canUseSystemCredentials(
bDefaultUseSystemCredentials);
}
else
{
bCanUseSystemCredentials = sal_False;
bDefaultUseSystemCredentials = sal_False;
}
LoginErrorInfo aInfo;
aInfo.SetTitle(rRequest.ServerName);
aInfo.SetServer(rRequest.ServerName);
if (rRequest.HasAccount)
aInfo.SetAccount(rRequest.Account);
if (rRequest.HasUserName)
aInfo.SetUserName(rRequest.UserName);
if (rRequest.HasPassword)
aInfo.SetPassword(rRequest.Password);
aInfo.SetErrorText(rRequest.Diagnostic);
aInfo.SetCanRememberPassword(
ePreferredRememberMode != eAlternateRememberMode);
aInfo.SetIsRememberPassword(
ePreferredRememberMode == eDefaultRememberMode);
aInfo.SetIsRememberPersistent(
ePreferredRememberMode == ucb::RememberAuthentication_PERSISTENT);
aInfo.SetCanUseSystemCredentials(bCanUseSystemCredentials);
aInfo.SetIsUseSystemCredentials( bDefaultUseSystemCredentials );
aInfo.SetModifyAccount(rRequest.HasAccount
&& xSupplyAuthentication.is()
&& xSupplyAuthentication->canSetAccount());
aInfo.SetModifyUserName(rRequest.HasUserName
&& xSupplyAuthentication.is()
&& xSupplyAuthentication->canSetUserName());
executeLoginDialog(pParent,
aInfo,
rRequest.HasRealm ? rRequest.Realm : OUString());
switch (aInfo.GetResult())
{
case ERRCODE_BUTTON_OK:
if (xSupplyAuthentication.is())
{
if (xSupplyAuthentication->canSetUserName())
xSupplyAuthentication->setUserName(aInfo.GetUserName());
if (xSupplyAuthentication->canSetPassword())
xSupplyAuthentication->setPassword(aInfo.GetPassword());
if (ePreferredRememberMode != eAlternateRememberMode)
{
// user had the choice.
if (aInfo.GetIsRememberPassword())
xSupplyAuthentication->setRememberPassword(
ePreferredRememberMode);
else
xSupplyAuthentication->setRememberPassword(
eAlternateRememberMode);
}
else
{
// user had no choice.
xSupplyAuthentication->setRememberPassword(
ePreferredRememberMode);
}
if (rRequest.HasRealm)
{
if (xSupplyAuthentication->canSetRealm())
xSupplyAuthentication->setRealm(aInfo.GetAccount());
}
else if (xSupplyAuthentication->canSetAccount())
xSupplyAuthentication->setAccount(aInfo.GetAccount());
if ( xSupplyAuthentication2.is() && bCanUseSystemCredentials )
xSupplyAuthentication2->setUseSystemCredentials(
aInfo.GetIsUseSystemCredentials() );
xSupplyAuthentication->select();
}
//////////////////////////
// Third, store credentials in password container.
if ( aInfo.GetIsUseSystemCredentials() )
{
if (aInfo.GetIsRememberPassword())
{
if (!aPwContainerHelper.addRecord(
!rURL.isEmpty() ? rURL : rRequest.ServerName,
OUString(), // empty u/p -> sys creds
uno::Sequence< OUString >(),
xIH,
ePreferredRememberMode
== ucb::RememberAuthentication_PERSISTENT))
{
xSupplyAuthentication->setRememberPassword(
ucb::RememberAuthentication_NO);
}
}
else if (eAlternateRememberMode
== ucb::RememberAuthentication_SESSION)
{
if (!aPwContainerHelper.addRecord(
!rURL.isEmpty() ? rURL : rRequest.ServerName,
OUString(), // empty u/p -> sys creds
uno::Sequence< OUString >(),
xIH,
false /* SESSION */))
{
xSupplyAuthentication->setRememberPassword(
ucb::RememberAuthentication_NO);
}
}
}
// Empty user name can not be valid:
else if (aInfo.GetUserName().Len() != 0)
{
uno::Sequence< OUString >
aPassList(aInfo.GetAccount().Len() == 0 ? 1 : 2);
aPassList[0] = aInfo.GetPassword();
if (aInfo.GetAccount().Len() != 0)
aPassList[1] = aInfo.GetAccount();
if (aInfo.GetIsRememberPassword())
{
if (!aPwContainerHelper.addRecord(
!rURL.isEmpty() ? rURL : rRequest.ServerName,
aInfo.GetUserName(),
aPassList,
xIH,
ePreferredRememberMode
== ucb::RememberAuthentication_PERSISTENT))
{
xSupplyAuthentication->setRememberPassword(
ucb::RememberAuthentication_NO);
}
}
else if (eAlternateRememberMode
== ucb::RememberAuthentication_SESSION)
{
if (!aPwContainerHelper.addRecord(
!rURL.isEmpty() ? rURL : rRequest.ServerName,
aInfo.GetUserName(),
aPassList,
xIH,
false /* SESSION */))
{
xSupplyAuthentication->setRememberPassword(
ucb::RememberAuthentication_NO);
}
}
}
break;
case ERRCODE_BUTTON_RETRY:
if (xRetry.is())
xRetry->select();
break;
default:
if (xAbort.is())
xAbort->select();
break;
}
}
void
executeMasterPasswordDialog(
Window * pParent,
LoginErrorInfo & rInfo,
task::PasswordRequestMode nMode)
SAL_THROW((uno::RuntimeException))
{
OString aMaster;
try
{
SolarMutexGuard aGuard;
boost::scoped_ptr< ResMgr > xManager(ResMgr::CreateResMgr("uui"));
if( nMode == task::PasswordRequestMode_PASSWORD_CREATE )
{
boost::scoped_ptr< MasterPasswordCreateDialog > xDialog(
new MasterPasswordCreateDialog(pParent, xManager.get()));
rInfo.SetResult(xDialog->Execute()
== RET_OK ? ERRCODE_BUTTON_OK : ERRCODE_BUTTON_CANCEL);
aMaster = OUStringToOString(
xDialog->GetMasterPassword(), RTL_TEXTENCODING_UTF8);
}
else
{
boost::scoped_ptr< MasterPasswordDialog > xDialog(
new MasterPasswordDialog(pParent, nMode, xManager.get()));
rInfo.SetResult(xDialog->Execute()
== RET_OK ? ERRCODE_BUTTON_OK : ERRCODE_BUTTON_CANCEL);
aMaster = OUStringToOString(
xDialog->GetMasterPassword(), RTL_TEXTENCODING_UTF8);
}
}
catch (std::bad_alloc const &)
{
throw uno::RuntimeException("out of memory",
uno::Reference< uno::XInterface >());
}
sal_uInt8 aKey[RTL_DIGEST_LENGTH_MD5];
rtl_digest_PBKDF2(aKey,
RTL_DIGEST_LENGTH_MD5,
reinterpret_cast< sal_uInt8 const * >(aMaster.getStr()),
aMaster.getLength(),
reinterpret_cast< sal_uInt8 const * >(
"3B5509ABA6BC42D9A3A1F3DAD49E56A51"),
32,
1000);
OUStringBuffer aBuffer;
for (int i = 0; i < RTL_DIGEST_LENGTH_MD5; ++i)
{
aBuffer.append(static_cast< sal_Unicode >('a' + (aKey[i] >> 4)));
aBuffer.append(static_cast< sal_Unicode >('a' + (aKey[i] & 15)));
}
rInfo.SetPassword(aBuffer.makeStringAndClear());
}
void
handleMasterPasswordRequest_(
Window * pParent,
task::PasswordRequestMode nMode,
uno::Sequence< uno::Reference< task::XInteractionContinuation > > const &
rContinuations)
SAL_THROW((uno::RuntimeException))
{
uno::Reference< task::XInteractionRetry > xRetry;
uno::Reference< task::XInteractionAbort > xAbort;
uno::Reference< ucb::XInteractionSupplyAuthentication >
xSupplyAuthentication;
getContinuations(rContinuations, &xRetry, &xAbort, &xSupplyAuthentication);
LoginErrorInfo aInfo;
// in case of master password a hash code is returned
executeMasterPasswordDialog(pParent, aInfo, nMode);
switch (aInfo.GetResult())
{
case ERRCODE_BUTTON_OK:
if (xSupplyAuthentication.is())
{
if (xSupplyAuthentication->canSetPassword())
xSupplyAuthentication->setPassword(aInfo.GetPassword());
xSupplyAuthentication->select();
}
break;
case ERRCODE_BUTTON_RETRY:
if (xRetry.is())
xRetry->select();
break;
default:
if (xAbort.is())
xAbort->select();
break;
}
}
void
executePasswordDialog(
Window * pParent,
LoginErrorInfo & rInfo,
task::PasswordRequestMode nMode,
OUString aDocName,
bool bMSCryptoMode,
bool bIsPasswordToModify,
bool bIsSimplePasswordRequest )
SAL_THROW((uno::RuntimeException))
{
try
{
SolarMutexGuard aGuard;
boost::scoped_ptr< ResMgr > xManager(ResMgr::CreateResMgr("uui"));
if( nMode == task::PasswordRequestMode_PASSWORD_CREATE )
{
if (bIsSimplePasswordRequest)
{
boost::scoped_ptr< PasswordDialog > pDialog(
new PasswordDialog( pParent, nMode, xManager.get(), aDocName,
bIsPasswordToModify, bIsSimplePasswordRequest ) );
pDialog->SetMinLen(0);
rInfo.SetResult( pDialog->Execute() == RET_OK ? ERRCODE_BUTTON_OK : ERRCODE_BUTTON_CANCEL );
rInfo.SetPassword( pDialog->GetPassword() );
}
else
{
const sal_uInt16 nMaxPasswdLen = bMSCryptoMode ? 15 : 0; // 0 -> allow any length
VclAbstractDialogFactory * pFact = VclAbstractDialogFactory::Create();
AbstractPasswordToOpenModifyDialog *pTmp = pFact->CreatePasswordToOpenModifyDialog( pParent, 0, nMaxPasswdLen, bIsPasswordToModify );
boost::scoped_ptr< AbstractPasswordToOpenModifyDialog > pDialog( pTmp );
rInfo.SetResult( pDialog->Execute() == RET_OK ? ERRCODE_BUTTON_OK : ERRCODE_BUTTON_CANCEL );
rInfo.SetPassword( pDialog->GetPasswordToOpen() );
rInfo.SetPasswordToModify( pDialog->GetPasswordToModify() );
rInfo.SetRecommendToOpenReadonly( pDialog->IsRecommendToOpenReadonly() );
}
}
else // enter password or reenter password
{
boost::scoped_ptr< PasswordDialog > pDialog(
new PasswordDialog( pParent, nMode, xManager.get(), aDocName,
bIsPasswordToModify, bIsSimplePasswordRequest ) );
pDialog->SetMinLen(0);
rInfo.SetResult( pDialog->Execute() == RET_OK ? ERRCODE_BUTTON_OK : ERRCODE_BUTTON_CANCEL );
rInfo.SetPassword( bIsPasswordToModify ? String() : pDialog->GetPassword() );
rInfo.SetPasswordToModify( bIsPasswordToModify ? pDialog->GetPassword() : String() );
}
}
catch (std::bad_alloc const &)
{
throw uno::RuntimeException("out of memory",
uno::Reference< uno::XInterface>());
}
}
void
handlePasswordRequest_(
Window * pParent,
task::PasswordRequestMode nMode,
uno::Sequence< uno::Reference< task::XInteractionContinuation > > const &
rContinuations,
OUString aDocumentName,
bool bMSCryptoMode,
bool bIsPasswordToModify,
bool bIsSimplePasswordRequest = false )
SAL_THROW((uno::RuntimeException))
{
uno::Reference< task::XInteractionRetry > xRetry;
uno::Reference< task::XInteractionAbort > xAbort;
uno::Reference< task::XInteractionPassword > xPassword;
uno::Reference< task::XInteractionPassword2 > xPassword2;
getContinuations(rContinuations, &xRetry, &xAbort, &xPassword2, &xPassword);
if ( xPassword2.is() && !xPassword.is() )
xPassword.set( xPassword2, uno::UNO_QUERY_THROW );
LoginErrorInfo aInfo;
executePasswordDialog( pParent, aInfo, nMode,
aDocumentName, bMSCryptoMode, bIsPasswordToModify, bIsSimplePasswordRequest );
switch (aInfo.GetResult())
{
case ERRCODE_BUTTON_OK:
OSL_ENSURE( !bIsPasswordToModify || xPassword2.is(), "PasswordToModify is requested, but there is no Interaction!" );
if (xPassword.is())
{
if (xPassword2.is())
{
xPassword2->setPasswordToModify( aInfo.GetPasswordToModify() );
xPassword2->setRecommendReadOnly( aInfo.IsRecommendToOpenReadonly() );
}
xPassword->setPassword(aInfo.GetPassword());
xPassword->select();
}
break;
case ERRCODE_BUTTON_RETRY:
if (xRetry.is())
xRetry->select();
break;
default:
if (xAbort.is())
xAbort->select();
break;
}
}
} // namespace
bool
UUIInteractionHelper::handleAuthenticationRequest(
uno::Reference< task::XInteractionRequest > const & rRequest)
SAL_THROW((uno::RuntimeException))
{
uno::Any aAnyRequest(rRequest->getRequest());
ucb::URLAuthenticationRequest aURLAuthenticationRequest;
if (aAnyRequest >>= aURLAuthenticationRequest)
{
handleAuthenticationRequest_(getParentProperty(),
getInteractionHandler(),
m_xContext,
aURLAuthenticationRequest,
rRequest->getContinuations(),
aURLAuthenticationRequest.URL);
return true;
}
ucb::AuthenticationRequest aAuthenticationRequest;
if (aAnyRequest >>= aAuthenticationRequest)
{
handleAuthenticationRequest_(getParentProperty(),
getInteractionHandler(),
m_xContext,
aAuthenticationRequest,
rRequest->getContinuations(),
OUString());
return true;
}
return false;
}
bool
UUIInteractionHelper::handleMasterPasswordRequest(
uno::Reference< task::XInteractionRequest > const & rRequest)
SAL_THROW((uno::RuntimeException))
{
uno::Any aAnyRequest(rRequest->getRequest());
task::MasterPasswordRequest aMasterPasswordRequest;
if (aAnyRequest >>= aMasterPasswordRequest)
{
handleMasterPasswordRequest_(getParentProperty(),
aMasterPasswordRequest.Mode,
rRequest->getContinuations());
return true;
}
return false;
}
bool
UUIInteractionHelper::handlePasswordRequest(
uno::Reference< task::XInteractionRequest > const & rRequest)
SAL_THROW((uno::RuntimeException))
{
// parameters to be filled for the call to handlePasswordRequest_
Window * pParent = getParentProperty();
task::PasswordRequestMode nMode = task::PasswordRequestMode_PASSWORD_ENTER;
uno::Sequence< uno::Reference< task::XInteractionContinuation > > const & rContinuations = rRequest->getContinuations();
OUString aDocumentName;
bool bMSCryptoMode = false;
bool bIsPasswordToModify = false;
bool bDoHandleRequest = false;
uno::Any aAnyRequest(rRequest->getRequest());
task::DocumentPasswordRequest2 aDocumentPasswordRequest2;
if (!bDoHandleRequest && (aAnyRequest >>= aDocumentPasswordRequest2))
{
nMode = aDocumentPasswordRequest2.Mode;
aDocumentName = aDocumentPasswordRequest2.Name;
OSL_ENSURE( bMSCryptoMode == false, "bMSCryptoMode should be false" );
bIsPasswordToModify = aDocumentPasswordRequest2.IsRequestPasswordToModify;
bDoHandleRequest = true;
}
task::DocumentPasswordRequest aDocumentPasswordRequest;
if (!bDoHandleRequest && (aAnyRequest >>= aDocumentPasswordRequest))
{
nMode = aDocumentPasswordRequest.Mode;
aDocumentName = aDocumentPasswordRequest.Name;
OSL_ENSURE( bMSCryptoMode == false, "bMSCryptoMode should be false" );
OSL_ENSURE( bIsPasswordToModify == false, "bIsPasswordToModify should be false" );
bDoHandleRequest = true;
}
task::DocumentMSPasswordRequest2 aDocumentMSPasswordRequest2;
if (!bDoHandleRequest && (aAnyRequest >>= aDocumentMSPasswordRequest2))
{
nMode = aDocumentMSPasswordRequest2.Mode;
aDocumentName = aDocumentMSPasswordRequest2.Name;
bMSCryptoMode = true;
bIsPasswordToModify = aDocumentMSPasswordRequest2.IsRequestPasswordToModify;
bDoHandleRequest = true;
}
task::DocumentMSPasswordRequest aDocumentMSPasswordRequest;
if (!bDoHandleRequest && (aAnyRequest >>= aDocumentMSPasswordRequest))
{
nMode = aDocumentMSPasswordRequest.Mode;
aDocumentName = aDocumentMSPasswordRequest.Name;
bMSCryptoMode = true;
OSL_ENSURE( bIsPasswordToModify == false, "bIsPasswordToModify should be false" );
bDoHandleRequest = true;
}
if (bDoHandleRequest)
{
handlePasswordRequest_( pParent, nMode, rContinuations,
aDocumentName, bMSCryptoMode, bIsPasswordToModify );
return true;
}
task::PasswordRequest aPasswordRequest;
if( aAnyRequest >>= aPasswordRequest )
{
handlePasswordRequest_(getParentProperty(),
aPasswordRequest.Mode,
rRequest->getContinuations(),
OUString(),
false /* bool bMSCryptoMode */,
false /* bool bIsPasswordToModify */,
true /* bool bIsSimplePasswordRequest */ );
return true;
}
return false;
}
/* vim:set shiftwidth=4 softtabstop=4 expandtab: */