///////////////////////////////////////////////////////////////////////////// // // Project: SMB kioslave for KDE2 // // File: kio_smb_auth.cpp // // Abstract: member function implementations for SMBSlave that deal with // SMB directory access // // Author(s): Matthew Peterson // //--------------------------------------------------------------------------- // // Copyright (c) 2000 Caldera Systems, Inc. // // This program is free software; you can redistribute it and/or modify it // under the terms of the GNU General Public License as published by the // Free Software Foundation; either version 2.1 of the License, or // (at your option) any later version. // // This program is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU Lesser General Public License for more details. // // You should have received a copy of the GNU General Public License // along with this program; see the file COPYING. If not, please obtain // a copy from http://www.gnu.org/copyleft/gpl.html // ///////////////////////////////////////////////////////////////////////////// #include "kio_smb.h" #include "kio_smb_internal.h" #include #include #include // call for libsmbclient //========================================================================== void auth_smbc_get_data(const char *server,const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) //========================================================================== { G_TheSlave->auth_smbc_get_data(server, share, workgroup,wgmaxlen, username, unmaxlen, password, pwmaxlen); } //-------------------------------------------------------------------------- void SMBSlave::auth_smbc_get_data(const char *server,const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) //-------------------------------------------------------------------------- { //check this to see if we "really" need to authenticate... SMBUrlType t = m_current_url.getType(); if( t == SMBURLTYPE_ENTIRE_NETWORK ) { kdDebug(KIO_SMB) << "we don't really need to authenticate for this top level url, returning" << endl; return; } kdDebug(KIO_SMB) << "AAAAAAAAAAAAAA auth_smbc_get_dat: set user=" << username << ", workgroup=" << workgroup << " server=" << server << ", share=" << share << endl; TQString s_server = TQString::fromUtf8(server); TQString s_share = TQString::fromUtf8(share); workgroup[wgmaxlen - 1] = 0; TQString s_workgroup = TQString::fromUtf8(workgroup); username[unmaxlen - 1] = 0; TQString s_username = TQString::fromUtf8(username); password[pwmaxlen - 1] = 0; TQString s_password = TQString::fromUtf8(password); KIO::AuthInfo info; info.url = KURL("smb:///"); info.url.setHost(s_server); info.url.setPath("/" + s_share); info.username = s_username; info.password = s_password; info.verifyPath = true; kdDebug(KIO_SMB) << "libsmb-auth-callback URL:" << info.url << endl; if ( !checkCachedAuthentication( info ) ) { if ( m_default_user.isEmpty() ) { // ok, we do not know the password. Let's try anonymous before we try for real info.username = "anonymous"; info.password = TQString::null; } else { // user defined a default username/password in kcontrol; try this info.username = m_default_user; info.password = m_default_password; } } else kdDebug(KIO_SMB) << "got password through cache" << endl; strncpy(username, info.username.utf8(), unmaxlen - 1); strncpy(password, info.password.utf8(), pwmaxlen - 1); } bool SMBSlave::checkPassword(SMBUrl &url) { kdDebug(KIO_SMB) << "checkPassword for " << url << endl; KIO::AuthInfo info; info.url = KURL("smb:///"); info.url.setHost(url.host()); TQString share = url.path(); int index = share.find('/', 1); if (index > 1) share = share.left(index); if (share.at(0) == '/') share = share.mid(1); info.url.setPath("/" + share); info.verifyPath = true; if ( share.isEmpty() ) info.prompt = i18n( "Please enter authentication information for %1" ) .arg( url.host() ); else info.prompt = i18n( "Please enter authentication information for:\n" "Server = %1\n" "Share = %2" ) .arg( url.host() ) .arg( share ); info.username = url.user(); kdDebug(KIO_SMB) << "call openPassDlg for " << info.url << endl; if ( openPassDlg(info) ) { kdDebug(KIO_SMB) << "openPassDlg returned " << info.username << endl; url.setUser(info.username); url.setPass(info.password); return true; } kdDebug(KIO_SMB) << "no value from openPassDlg\n"; return false; } //-------------------------------------------------------------------------- // Initalizes the smbclient library // // Returns: 0 on success -1 with errno set on error bool SMBSlave::auth_initialize_smbc() { SMBCCTX *smb_context = NULL; kdDebug(KIO_SMB) << "auth_initialize_smbc " << endl; if(m_initialized_smbc == false) { kdDebug(KIO_SMB) << "smbc_init call" << endl; KSimpleConfig cfg( "kioslaverc", true ); cfg.setGroup( "SMB" ); int debug_level = cfg.readNumEntry( "DebugLevel", 0 ); #if 0 /* old API initialisation routine does not allow to set flags */ if(smbc_init(::auth_smbc_get_data,debug_level) == -1) { SlaveBase::error(ERR_INTERNAL, i18n("libsmbclient failed to initialize")); return false; } #endif smb_context = smbc_new_context(); if (smb_context == NULL) { SlaveBase::error(ERR_INTERNAL, i18n("libsmbclient failed to create context")); return false; } smb_context->debug = debug_level; smb_context->callbacks.auth_fn = ::auth_smbc_get_data; if (!smbc_init_context(smb_context)) { smbc_free_context(smb_context, false); smb_context = NULL; SlaveBase::error(ERR_INTERNAL, i18n("libsmbclient failed to initialize context")); return false; } #if defined(SMB_CTX_FLAG_USE_KERBEROS) && defined(SMB_CTX_FLAG_FALLBACK_AFTER_KERBEROS) smb_context->flags |= SMB_CTX_FLAG_USE_KERBEROS | SMB_CTX_FLAG_FALLBACK_AFTER_KERBEROS; #endif smbc_set_context(smb_context); m_initialized_smbc = true; } return true; }