|
|
|
/////////////////////////////////////////////////////////////////////////////
|
|
|
|
//
|
|
|
|
// Project: SMB kioslave for KDE2
|
|
|
|
//
|
|
|
|
// File: kio_smb_auth.cpp
|
|
|
|
//
|
|
|
|
// Abstract: member function implementations for SMBSlave that deal with
|
|
|
|
// SMB directory access
|
|
|
|
//
|
|
|
|
// Author(s): Matthew Peterson <mpeterson@caldera.com>
|
|
|
|
//
|
|
|
|
//---------------------------------------------------------------------------
|
|
|
|
//
|
|
|
|
// Copyright (c) 2000 Caldera Systems, Inc.
|
|
|
|
//
|
|
|
|
// This program is free software; you can redistribute it and/or modify it
|
|
|
|
// under the terms of the GNU General Public License as published by the
|
|
|
|
// Free Software Foundation; either version 2.1 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// This program is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Lesser General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU General Public License
|
|
|
|
// along with this program; see the file COPYING. If not, please obtain
|
|
|
|
// a copy from http://www.gnu.org/copyleft/gpl.html
|
|
|
|
//
|
|
|
|
/////////////////////////////////////////////////////////////////////////////
|
|
|
|
|
|
|
|
#include "kio_smb.h"
|
|
|
|
#include "kio_smb_internal.h"
|
|
|
|
|
|
|
|
#include <ksimpleconfig.h>
|
|
|
|
#include <tqdir.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
|
|
|
|
// call for libsmbclient
|
|
|
|
//==========================================================================
|
|
|
|
void auth_smbc_get_data(const char *server,const char *share,
|
|
|
|
char *workgroup, int wgmaxlen,
|
|
|
|
char *username, int unmaxlen,
|
|
|
|
char *password, int pwmaxlen)
|
|
|
|
//==========================================================================
|
|
|
|
{
|
|
|
|
G_TheSlave->auth_smbc_get_data(server, share,
|
|
|
|
workgroup,wgmaxlen,
|
|
|
|
username, unmaxlen,
|
|
|
|
password, pwmaxlen);
|
|
|
|
}
|
|
|
|
|
|
|
|
//--------------------------------------------------------------------------
|
|
|
|
void SMBSlave::auth_smbc_get_data(const char *server,const char *share,
|
|
|
|
char *workgroup, int wgmaxlen,
|
|
|
|
char *username, int unmaxlen,
|
|
|
|
char *password, int pwmaxlen)
|
|
|
|
//--------------------------------------------------------------------------
|
|
|
|
{
|
|
|
|
//check this to see if we "really" need to authenticate...
|
|
|
|
SMBUrlType t = m_current_url.getType();
|
|
|
|
if( t == SMBURLTYPE_ENTIRE_NETWORK )
|
|
|
|
{
|
|
|
|
kdDebug(KIO_SMB) << "we don't really need to authenticate for this top level url, returning" << endl;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
kdDebug(KIO_SMB) << "AAAAAAAAAAAAAA auth_smbc_get_dat: set user=" << username << ", workgroup=" << workgroup
|
|
|
|
<< " server=" << server << ", share=" << share << endl;
|
|
|
|
|
|
|
|
TQString s_server = TQString::fromUtf8(server);
|
|
|
|
TQString s_share = TQString::fromUtf8(share);
|
|
|
|
workgroup[wgmaxlen - 1] = 0;
|
|
|
|
TQString s_workgroup = TQString::fromUtf8(workgroup);
|
|
|
|
username[unmaxlen - 1] = 0;
|
|
|
|
TQString s_username = TQString::fromUtf8(username);
|
|
|
|
password[pwmaxlen - 1] = 0;
|
|
|
|
TQString s_password = TQString::fromUtf8(password);
|
|
|
|
|
|
|
|
KIO::AuthInfo info;
|
|
|
|
info.url = KURL("smb:///");
|
|
|
|
info.url.setHost(s_server);
|
|
|
|
info.url.setPath("/" + s_share);
|
|
|
|
|
|
|
|
info.username = s_username;
|
|
|
|
info.password = s_password;
|
|
|
|
info.verifyPath = true;
|
|
|
|
|
|
|
|
kdDebug(KIO_SMB) << "libsmb-auth-callback URL:" << info.url << endl;
|
|
|
|
|
|
|
|
if ( !checkCachedAuthentication( info ) )
|
|
|
|
{
|
|
|
|
if ( m_default_user.isEmpty() )
|
|
|
|
{
|
|
|
|
// ok, we do not know the password. Let's try anonymous before we try for real
|
|
|
|
info.username = "anonymous";
|
|
|
|
info.password = TQString::null;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
// user defined a default username/password in kcontrol; try this
|
|
|
|
info.username = m_default_user;
|
|
|
|
info.password = m_default_password;
|
|
|
|
}
|
|
|
|
|
|
|
|
} else
|
|
|
|
kdDebug(KIO_SMB) << "got password through cache" << endl;
|
|
|
|
|
|
|
|
strncpy(username, info.username.utf8(), unmaxlen - 1);
|
|
|
|
strncpy(password, info.password.utf8(), pwmaxlen - 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool SMBSlave::checkPassword(SMBUrl &url)
|
|
|
|
{
|
|
|
|
kdDebug(KIO_SMB) << "checkPassword for " << url << endl;
|
|
|
|
|
|
|
|
KIO::AuthInfo info;
|
|
|
|
info.url = KURL("smb:///");
|
|
|
|
info.url.setHost(url.host());
|
|
|
|
|
|
|
|
TQString share = url.path();
|
|
|
|
int index = share.find('/', 1);
|
|
|
|
if (index > 1)
|
|
|
|
share = share.left(index);
|
|
|
|
if (share.at(0) == '/')
|
|
|
|
share = share.mid(1);
|
|
|
|
info.url.setPath("/" + share);
|
|
|
|
info.verifyPath = true;
|
|
|
|
|
|
|
|
if ( share.isEmpty() )
|
|
|
|
info.prompt = i18n(
|
|
|
|
"<qt>Please enter authentication information for <b>%1</b></qt>" )
|
|
|
|
.arg( url.host() );
|
|
|
|
else
|
|
|
|
info.prompt = i18n(
|
|
|
|
"Please enter authentication information for:\n"
|
|
|
|
"Server = %1\n"
|
|
|
|
"Share = %2" )
|
|
|
|
.arg( url.host() )
|
|
|
|
.arg( share );
|
|
|
|
|
|
|
|
info.username = url.user();
|
|
|
|
kdDebug(KIO_SMB) << "call openPassDlg for " << info.url << endl;
|
|
|
|
|
|
|
|
if ( openPassDlg(info) ) {
|
|
|
|
kdDebug(KIO_SMB) << "openPassDlg returned " << info.username << endl;
|
|
|
|
url.setUser(info.username);
|
|
|
|
url.setPass(info.password);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
kdDebug(KIO_SMB) << "no value from openPassDlg\n";
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
//--------------------------------------------------------------------------
|
|
|
|
// Initalizes the smbclient library
|
|
|
|
//
|
|
|
|
// Returns: 0 on success -1 with errno set on error
|
|
|
|
bool SMBSlave::auth_initialize_smbc()
|
|
|
|
{
|
|
|
|
SMBCCTX *smb_context = NULL;
|
|
|
|
|
|
|
|
kdDebug(KIO_SMB) << "auth_initialize_smbc " << endl;
|
|
|
|
if(m_initialized_smbc == false)
|
|
|
|
{
|
|
|
|
kdDebug(KIO_SMB) << "smbc_init call" << endl;
|
|
|
|
KSimpleConfig cfg( "kioslaverc", true );
|
|
|
|
|
|
|
|
cfg.setGroup( "SMB" );
|
|
|
|
int debug_level = cfg.readNumEntry( "DebugLevel", 0 );
|
|
|
|
|
|
|
|
#if 0
|
|
|
|
/* old API initialisation routine does not allow to set flags */
|
|
|
|
|
|
|
|
if(smbc_init(::auth_smbc_get_data,debug_level) == -1)
|
|
|
|
{
|
|
|
|
SlaveBase::error(ERR_INTERNAL, i18n("libsmbclient failed to initialize"));
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
smb_context = smbc_new_context();
|
|
|
|
if (smb_context == NULL) {
|
|
|
|
SlaveBase::error(ERR_INTERNAL, i18n("libsmbclient failed to create context"));
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
smb_context->debug = debug_level;
|
|
|
|
smb_context->callbacks.auth_fn = ::auth_smbc_get_data;
|
|
|
|
|
|
|
|
if (!smbc_init_context(smb_context)) {
|
|
|
|
smbc_free_context(smb_context, false);
|
|
|
|
smb_context = NULL;
|
|
|
|
SlaveBase::error(ERR_INTERNAL, i18n("libsmbclient failed to initialize context"));
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
#if defined(SMB_CTX_FLAG_USE_KERBEROS) && defined(SMB_CTX_FLAG_FALLBACK_AFTER_KERBEROS)
|
|
|
|
smb_context->flags |= SMB_CTX_FLAG_USE_KERBEROS | SMB_CTX_FLAG_FALLBACK_AFTER_KERBEROS;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
smbc_set_context(smb_context);
|
|
|
|
|
|
|
|
m_initialized_smbc = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|