summaryrefslogtreecommitdiffstats
path: root/tdeioslave/smb/tdeio_smb_auth.cpp
diff options
context:
space:
mode:
authorTimothy Pearson <kb9vqf@pearsoncomputing.net>2013-01-27 15:11:21 -0600
committerTimothy Pearson <kb9vqf@pearsoncomputing.net>2013-01-27 15:11:21 -0600
commit472156a41b1348c714986c772759ad950fffbe75 (patch)
tree86369dab3bbe3d52c49051665bdfb49b9dfc16e3 /tdeioslave/smb/tdeio_smb_auth.cpp
parent3e891e81335e5243583dab27faeebf001b8139a6 (diff)
downloadtdebase-472156a41b1348c714986c772759ad950fffbe75.tar.gz
tdebase-472156a41b1348c714986c772759ad950fffbe75.zip
Rename kioslaves
Diffstat (limited to 'tdeioslave/smb/tdeio_smb_auth.cpp')
-rw-r--r--tdeioslave/smb/tdeio_smb_auth.cpp207
1 files changed, 207 insertions, 0 deletions
diff --git a/tdeioslave/smb/tdeio_smb_auth.cpp b/tdeioslave/smb/tdeio_smb_auth.cpp
new file mode 100644
index 000000000..ebc15c1c6
--- /dev/null
+++ b/tdeioslave/smb/tdeio_smb_auth.cpp
@@ -0,0 +1,207 @@
+/////////////////////////////////////////////////////////////////////////////
+//
+// Project: SMB tdeioslave for KDE2
+//
+// File: tdeio_smb_auth.cpp
+//
+// Abstract: member function implementations for SMBSlave that deal with
+// SMB directory access
+//
+// Author(s): Matthew Peterson <mpeterson@caldera.com>
+//
+//---------------------------------------------------------------------------
+//
+// Copyright (c) 2000 Caldera Systems, Inc.
+//
+// This program is free software; you can redistribute it and/or modify it
+// under the terms of the GNU General Public License as published by the
+// Free Software Foundation; either version 2.1 of the License, or
+// (at your option) any later version.
+//
+// This program is distributed in the hope that it will be useful,
+// but WITHOUT ANY WARRANTY; without even the implied warranty of
+// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+// GNU Lesser General Public License for more details.
+//
+// You should have received a copy of the GNU General Public License
+// along with this program; see the file COPYING. If not, please obtain
+// a copy from http://www.gnu.org/copyleft/gpl.html
+//
+/////////////////////////////////////////////////////////////////////////////
+
+#include "tdeio_smb.h"
+#include "tdeio_smb_internal.h"
+
+#include <ksimpleconfig.h>
+#include <tqdir.h>
+#include <stdlib.h>
+
+// call for libsmbclient
+//==========================================================================
+void auth_smbc_get_data(const char *server,const char *share,
+ char *workgroup, int wgmaxlen,
+ char *username, int unmaxlen,
+ char *password, int pwmaxlen)
+//==========================================================================
+{
+ G_TheSlave->auth_smbc_get_data(server, share,
+ workgroup,wgmaxlen,
+ username, unmaxlen,
+ password, pwmaxlen);
+}
+
+//--------------------------------------------------------------------------
+void SMBSlave::auth_smbc_get_data(const char *server,const char *share,
+ char *workgroup, int wgmaxlen,
+ char *username, int unmaxlen,
+ char *password, int pwmaxlen)
+//--------------------------------------------------------------------------
+{
+ //check this to see if we "really" need to authenticate...
+ SMBUrlType t = m_current_url.getType();
+ if( t == SMBURLTYPE_ENTIRE_NETWORK )
+ {
+ kdDebug(KIO_SMB) << "we don't really need to authenticate for this top level url, returning" << endl;
+ return;
+ }
+ kdDebug(KIO_SMB) << "AAAAAAAAAAAAAA auth_smbc_get_dat: set user=" << username << ", workgroup=" << workgroup
+ << " server=" << server << ", share=" << share << endl;
+
+ TQString s_server = TQString::fromUtf8(server);
+ TQString s_share = TQString::fromUtf8(share);
+ workgroup[wgmaxlen - 1] = 0;
+ TQString s_workgroup = TQString::fromUtf8(workgroup);
+ username[unmaxlen - 1] = 0;
+ TQString s_username = TQString::fromUtf8(username);
+ password[pwmaxlen - 1] = 0;
+ TQString s_password = TQString::fromUtf8(password);
+
+ TDEIO::AuthInfo info;
+ info.url = KURL("smb:///");
+ info.url.setHost(s_server);
+ info.url.setPath("/" + s_share);
+
+ info.username = s_username;
+ info.password = s_password;
+ info.verifyPath = true;
+
+ kdDebug(KIO_SMB) << "libsmb-auth-callback URL:" << info.url << endl;
+
+ if ( !checkCachedAuthentication( info ) )
+ {
+ if ( m_default_user.isEmpty() )
+ {
+ // ok, we do not know the password. Let's try anonymous before we try for real
+ info.username = "anonymous";
+ info.password = TQString::null;
+ }
+ else
+ {
+ // user defined a default username/password in kcontrol; try this
+ info.username = m_default_user;
+ info.password = m_default_password;
+ }
+
+ } else
+ kdDebug(KIO_SMB) << "got password through cache" << endl;
+
+ strncpy(username, info.username.utf8(), unmaxlen - 1);
+ strncpy(password, info.password.utf8(), pwmaxlen - 1);
+}
+
+bool SMBSlave::checkPassword(SMBUrl &url)
+{
+ kdDebug(KIO_SMB) << "checkPassword for " << url << endl;
+
+ TDEIO::AuthInfo info;
+ info.url = KURL("smb:///");
+ info.url.setHost(url.host());
+
+ TQString share = url.path();
+ int index = share.find('/', 1);
+ if (index > 1)
+ share = share.left(index);
+ if (share.at(0) == '/')
+ share = share.mid(1);
+ info.url.setPath("/" + share);
+ info.verifyPath = true;
+
+ if ( share.isEmpty() )
+ info.prompt = i18n(
+ "<qt>Please enter authentication information for <b>%1</b></qt>" )
+ .arg( url.host() );
+ else
+ info.prompt = i18n(
+ "Please enter authentication information for:\n"
+ "Server = %1\n"
+ "Share = %2" )
+ .arg( url.host() )
+ .arg( share );
+
+ info.username = url.user();
+ kdDebug(KIO_SMB) << "call openPassDlg for " << info.url << endl;
+
+ if ( openPassDlg(info) ) {
+ kdDebug(KIO_SMB) << "openPassDlg returned " << info.username << endl;
+ url.setUser(info.username);
+ url.setPass(info.password);
+ return true;
+ }
+ kdDebug(KIO_SMB) << "no value from openPassDlg\n";
+ return false;
+}
+
+//--------------------------------------------------------------------------
+// Initalizes the smbclient library
+//
+// Returns: 0 on success -1 with errno set on error
+bool SMBSlave::auth_initialize_smbc()
+{
+ SMBCCTX *smb_context = NULL;
+
+ kdDebug(KIO_SMB) << "auth_initialize_smbc " << endl;
+ if(m_initialized_smbc == false)
+ {
+ kdDebug(KIO_SMB) << "smbc_init call" << endl;
+ KSimpleConfig cfg( "tdeioslaverc", true );
+
+ cfg.setGroup( "SMB" );
+ int debug_level = cfg.readNumEntry( "DebugLevel", 0 );
+
+#if 0
+ /* old API initialisation routine does not allow to set flags */
+
+ if(smbc_init(::auth_smbc_get_data,debug_level) == -1)
+ {
+ SlaveBase::error(ERR_INTERNAL, i18n("libsmbclient failed to initialize"));
+ return false;
+ }
+#endif
+ smb_context = smbc_new_context();
+ if (smb_context == NULL) {
+ SlaveBase::error(ERR_INTERNAL, i18n("libsmbclient failed to create context"));
+ return false;
+ }
+
+ smb_context->debug = debug_level;
+ smb_context->callbacks.auth_fn = ::auth_smbc_get_data;
+
+ if (!smbc_init_context(smb_context)) {
+ smbc_free_context(smb_context, false);
+ smb_context = NULL;
+ SlaveBase::error(ERR_INTERNAL, i18n("libsmbclient failed to initialize context"));
+ return false;
+ }
+
+#if defined(SMB_CTX_FLAG_USE_KERBEROS) && defined(SMB_CTX_FLAG_FALLBACK_AFTER_KERBEROS)
+ smb_context->flags |= SMB_CTX_FLAG_USE_KERBEROS | SMB_CTX_FLAG_FALLBACK_AFTER_KERBEROS;
+#endif
+
+ smbc_set_context(smb_context);
+
+ m_initialized_smbc = true;
+ }
+
+ return true;
+}
+