version 1.7.4.2, 2004/04/25 20:39:57
|
version 1.8, 2004/05/05 12:51:27
|
|
|
// Author: Nag Boranna, Hewlett-Packard Company(nagaraja_boranna@hp.com) | // Author: Nag Boranna, Hewlett-Packard Company(nagaraja_boranna@hp.com) |
// | // |
// Modified By: Jair Santos, Hewlett-Packard Company (jair.santos@hp.com) | // Modified By: Jair Santos, Hewlett-Packard Company (jair.santos@hp.com) |
// Heather Sterling, IBM (hsterl@us.ibm.com) |
// Amit K Arora, IBM (amita@in.ibm.com) for PEP-101 |
// | // |
//%///////////////////////////////////////////////////////////////////////////// | //%///////////////////////////////////////////////////////////////////////////// |
| |
|
|
#include <Pegasus/Common/Tracer.h> | #include <Pegasus/Common/Tracer.h> |
#include "AuthenticationInfoRep.h" | #include "AuthenticationInfoRep.h" |
| |
#ifdef PEGASUS_HAS_SSL |
|
#include <Pegasus/Common/TLS.h> |
|
#endif |
|
|
|
PEGASUS_USING_STD; | PEGASUS_USING_STD; |
| |
PEGASUS_NAMESPACE_BEGIN | PEGASUS_NAMESPACE_BEGIN |
|
|
PEG_METHOD_ENTER( | PEG_METHOD_ENTER( |
TRC_AUTHENTICATION, "AuthenticationInfoRep::AuthenticationInfoRep"); | TRC_AUTHENTICATION, "AuthenticationInfoRep::AuthenticationInfoRep"); |
| |
#ifdef PEGASUS_KERBEROS_AUTHENTICATION |
|
_securityAssoc = NULL; |
|
#endif |
|
|
|
#ifdef PEGASUS_USE_232_CLIENT_VERIFICATION |
|
#ifdef PEGASUS_HAS_SSL |
|
_peerCertificate = NULL; |
|
_certificateStatus = 0; |
|
#endif |
|
#endif |
|
|
|
PEG_METHOD_EXIT(); | PEG_METHOD_EXIT(); |
} | } |
| |
|
|
PEG_METHOD_ENTER( | PEG_METHOD_ENTER( |
TRC_AUTHENTICATION, "AuthenticationInfoRep::~AuthenticationInfoRep"); | TRC_AUTHENTICATION, "AuthenticationInfoRep::~AuthenticationInfoRep"); |
| |
#ifdef PEGASUS_KERBEROS_AUTHENTICATION |
|
if (_securityAssoc) |
|
{ |
|
delete _securityAssoc; |
|
_securityAssoc = 0; |
|
} |
|
#endif |
|
|
|
PEG_METHOD_EXIT(); | PEG_METHOD_EXIT(); |
} | } |
| |
|
|
PEG_METHOD_ENTER( | PEG_METHOD_ENTER( |
TRC_AUTHENTICATION, "AuthenticationInfoRep::setSecurityAssociation"); | TRC_AUTHENTICATION, "AuthenticationInfoRep::setSecurityAssociation"); |
| |
if ( !_securityAssoc ) |
if ( !_securityAssoc.get() ) |
{ | { |
_securityAssoc = new CIMKerberosSecurityAssociation; |
_securityAssoc = AutoPtr<CIMKerberosSecurityAssociation>(new |
|
CIMKerberosSecurityAssociation); |
} | } |
| |
PEG_METHOD_EXIT(); | PEG_METHOD_EXIT(); |
} | } |
#endif | #endif |
| |
#ifdef PEGASUS_USE_232_CLIENT_VERIFICATION |
|
#ifdef PEGASUS_HAS_SSL |
|
void AuthenticationInfoRep::setPeerCertificate(SSLCertificateInfo* peerCertificate) |
|
{ |
|
PEG_METHOD_ENTER( |
|
TRC_AUTHENTICATION, "AuthenticationInfoRep::setCertificateStatus"); |
|
|
|
_peerCertificate = peerCertificate; |
|
|
|
PEG_METHOD_EXIT(); |
|
} |
|
|
|
void AuthenticationInfoRep::setCertificateStatus(Sint32 certificateStatus) |
|
{ |
|
PEG_METHOD_ENTER( |
|
TRC_AUTHENTICATION, "AuthenticationInfoRep::setCertificateStatus"); |
|
|
|
_certificateStatus = certificateStatus; |
|
|
|
// check the certificate authentication status to determine whether or not this |
|
// client is trusted |
|
if (_certificateStatus == SSLSocket::CERT_SUCCESS) |
|
{ |
|
PEG_TRACE_STRING(TRC_DISCARDED_DATA, Tracer::LEVEL2, |
|
"AuthenticationInfoRep::Client authenticated via SSL certificate"); |
|
_authStatus = AUTHENTICATED; |
|
_privileged = true; |
|
} |
|
|
|
PEG_METHOD_EXIT(); |
|
} |
|
#endif |
|
#endif |
|
| |
PEGASUS_NAMESPACE_END | PEGASUS_NAMESPACE_END |