You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
tdebase/kioslave/smb/kio_smb_auth.cpp

208 lines
6.9 KiB

/////////////////////////////////////////////////////////////////////////////
//
// Project: SMB kioslave for KDE2
//
// File: kio_smb_auth.cpp
//
// Abstract: member function implementations for SMBSlave that deal with
// SMB directory access
//
// Author(s): Matthew Peterson <mpeterson@caldera.com>
//
//---------------------------------------------------------------------------
//
// Copyright (c) 2000 Caldera Systems, Inc.
//
// This program is free software; you can redistribute it and/or modify it
// under the terms of the GNU General Public License as published by the
// Free Software Foundation; either version 2.1 of the License, or
// (at your option) any later version.
//
// This program is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU Lesser General Public License for more details.
//
// You should have received a copy of the GNU General Public License
// along with this program; see the file COPYING. If not, please obtain
// a copy from http://www.gnu.org/copyleft/gpl.html
//
/////////////////////////////////////////////////////////////////////////////
#include "kio_smb.h"
#include "kio_smb_internal.h"
#include <ksimpleconfig.h>
#include <tqdir.h>
#include <stdlib.h>
// call for libsmbclient
//==========================================================================
void auth_smbc_get_data(const char *server,const char *share,
char *workgroup, int wgmaxlen,
char *username, int unmaxlen,
char *password, int pwmaxlen)
//==========================================================================
{
G_TheSlave->auth_smbc_get_data(server, share,
workgroup,wgmaxlen,
username, unmaxlen,
password, pwmaxlen);
}
//--------------------------------------------------------------------------
void SMBSlave::auth_smbc_get_data(const char *server,const char *share,
char *workgroup, int wgmaxlen,
char *username, int unmaxlen,
char *password, int pwmaxlen)
//--------------------------------------------------------------------------
{
//check this to see if we "really" need to authenticate...
SMBUrlType t = m_current_url.getType();
if( t == SMBURLTYPE_ENTIRE_NETWORK )
{
kdDebug(KIO_SMB) << "we don't really need to authenticate for this top level url, returning" << endl;
return;
}
kdDebug(KIO_SMB) << "AAAAAAAAAAAAAA auth_smbc_get_dat: set user=" << username << ", workgroup=" << workgroup
<< " server=" << server << ", share=" << share << endl;
TQString s_server = TQString::fromUtf8(server);
TQString s_share = TQString::fromUtf8(share);
workgroup[wgmaxlen - 1] = 0;
TQString s_workgroup = TQString::fromUtf8(workgroup);
username[unmaxlen - 1] = 0;
TQString s_username = TQString::fromUtf8(username);
password[pwmaxlen - 1] = 0;
TQString s_password = TQString::fromUtf8(password);
KIO::AuthInfo info;
info.url = KURL("smb:///");
info.url.setHost(s_server);
info.url.setPath("/" + s_share);
info.username = s_username;
info.password = s_password;
info.verifyPath = true;
kdDebug(KIO_SMB) << "libsmb-auth-callback URL:" << info.url << endl;
if ( !checkCachedAuthentication( info ) )
{
if ( m_default_user.isEmpty() )
{
// ok, we do not know the password. Let's try anonymous before we try for real
info.username = "anonymous";
info.password = TQString::null;
}
else
{
// user defined a default username/password in kcontrol; try this
info.username = m_default_user;
info.password = m_default_password;
}
} else
kdDebug(KIO_SMB) << "got password through cache" << endl;
strncpy(username, info.username.utf8(), unmaxlen - 1);
strncpy(password, info.password.utf8(), pwmaxlen - 1);
}
bool SMBSlave::checkPassword(SMBUrl &url)
{
kdDebug(KIO_SMB) << "checkPassword for " << url << endl;
KIO::AuthInfo info;
info.url = KURL("smb:///");
info.url.setHost(url.host());
TQString share = url.path();
int index = share.find('/', 1);
if (index > 1)
share = share.left(index);
if (share.tqat(0) == '/')
share = share.mid(1);
info.url.setPath("/" + share);
info.verifyPath = true;
if ( share.isEmpty() )
info.prompt = i18n(
"<qt>Please enter authentication information for <b>%1</b></qt>" )
.arg( url.host() );
else
info.prompt = i18n(
"Please enter authentication information for:\n"
"Server = %1\n"
"Share = %2" )
.arg( url.host() )
.arg( share );
info.username = url.user();
kdDebug(KIO_SMB) << "call openPassDlg for " << info.url << endl;
if ( openPassDlg(info) ) {
kdDebug(KIO_SMB) << "openPassDlg returned " << info.username << endl;
url.setUser(info.username);
url.setPass(info.password);
return true;
}
kdDebug(KIO_SMB) << "no value from openPassDlg\n";
return false;
}
//--------------------------------------------------------------------------
// Initalizes the smbclient library
//
// Returns: 0 on success -1 with errno set on error
bool SMBSlave::auth_initialize_smbc()
{
SMBCCTX *smb_context = NULL;
kdDebug(KIO_SMB) << "auth_initialize_smbc " << endl;
if(m_initialized_smbc == false)
{
kdDebug(KIO_SMB) << "smbc_init call" << endl;
KSimpleConfig cfg( "kioslaverc", true );
cfg.setGroup( "SMB" );
int debug_level = cfg.readNumEntry( "DebugLevel", 0 );
#if 0
/* old API initialisation routine does not allow to set flags */
if(smbc_init(::auth_smbc_get_data,debug_level) == -1)
{
SlaveBase::error(ERR_INTERNAL, i18n("libsmbclient failed to initialize"));
return false;
}
#endif
smb_context = smbc_new_context();
if (smb_context == NULL) {
SlaveBase::error(ERR_INTERNAL, i18n("libsmbclient failed to create context"));
return false;
}
smb_context->debug = debug_level;
smb_context->callbacks.auth_fn = ::auth_smbc_get_data;
if (!smbc_init_context(smb_context)) {
smbc_free_context(smb_context, false);
smb_context = NULL;
SlaveBase::error(ERR_INTERNAL, i18n("libsmbclient failed to initialize context"));
return false;
}
#if defined(SMB_CTX_FLAG_USE_KERBEROS) && defined(SMB_CTX_FLAG_FALLBACK_AFTER_KERBEROS)
smb_context->flags |= SMB_CTX_FLAG_USE_KERBEROS | SMB_CTX_FLAG_FALLBACK_AFTER_KERBEROS;
#endif
smbc_set_context(smb_context);
m_initialized_smbc = true;
}
return true;
}