summaryrefslogtreecommitdiff
path: root/src/user_share-private.c
blob: 8e2bf2c0393daa1a94737e9782602d488c9e9a9b (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
/* -*- Mode: C; indent-tabs-mode: t; c-basic-offset: 4; tab-width: 4 -*- */

/*
 *  Copyright (C) 2004-2008 Red Hat, Inc.
 *  Copyright (C) 2012-2021 MATE Developers
 *
 *  Caja is free software; you can redistribute it and/or
 *  modify it under the terms of the GNU General Public License as
 *  published by the Free Software Foundation; either version 2 of the
 *  License, or (at your option) any later version.
 *
 *  Caja is distributed in the hope that it will be useful,
 *  but WITHOUT ANY WARRANTY; without even the implied warranty of
 *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 *  General Public License for more details.
 *
 *  You should have received a copy of the GNU General Public License
 *  along with this program; if not, write to the Free Software
 *  Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA.
 *
 *  Authors: Alexander Larsson <alexl@redhat.com>
 *  Bastien Nocera <hadess@hadess.net>
 *
 */

#include "config.h"

#include <string.h>

#include "user_share-private.h"

static char *password_setting_strings[] = {
    "never",
    "on_write",
    "always"
};

static char *accept_file_strings[] = {
    "always",
    "bonded",
    "ask"
};

const char *
password_string_from_setting (PasswordSetting setting)
{

    if (setting >= 0 && setting <= PASSWORD_ALWAYS)
	return password_setting_strings[setting];

    /* Fallback on secure pref */
    return password_setting_strings[PASSWORD_ALWAYS];
}

PasswordSetting
password_setting_from_string (const char *str)
{
    if (str != NULL) {
	if (strcmp (str, "never") == 0) {
	    return PASSWORD_NEVER;
	}
	if (strcmp (str, "always") == 0) {
	    return PASSWORD_ALWAYS;
	}
	if (strcmp (str, "on_write") == 0) {
	    return PASSWORD_ON_WRITE;
	}
    }

    /* Fallback on secure pref */
    return PASSWORD_ALWAYS;
}

const char *
accept_string_from_setting (AcceptSetting setting)
{

    if (setting >= 0 && setting <= ACCEPT_ASK)
	return accept_file_strings[setting];

    /* Fallback on secure pref */
    return accept_file_strings[ACCEPT_BONDED];
}

AcceptSetting
accept_setting_from_string (const char *str)
{
    if (str != NULL) {
	if (strcmp (str, "always") == 0) {
	    return ACCEPT_ALWAYS;
	}
	if (strcmp (str, "bonded") == 0 ||
	    strcmp (str, "bonded_and_trusted") == 0) {
	    return ACCEPT_BONDED;
	}
	if (strcmp (str, "ask") == 0) {
	    return ACCEPT_ASK;
	}
    }

    /* Fallback on secure pref */
    return ACCEPT_BONDED;
}