mirror of
https://gitlab.freedesktop.org/NetworkManager/NetworkManager.git
synced 2026-05-19 08:38:08 +02:00
Patch from Christian Persch <chpe@gnome.org> * auth-dialog/main.c - Fix memleak by unrefing the GnomeProgram instance (Gnome.org #383110) git-svn-id: http://svn-archive.gnome.org/svn/NetworkManager/trunk@2174 4912f4e0-d625-0410-9fb7-b9a5a253dbdc
453 lines
14 KiB
C
453 lines
14 KiB
C
/* NetworkManager Wireless Applet -- Display wireless access points and allow user control
|
|
*
|
|
* Dan Williams <dcbw@redhat.com>
|
|
* Tim Niemueller <tim@niemueller.de>
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
|
|
*
|
|
* (C) Copyright 2004 Red Hat, Inc.
|
|
* 2005 Tim Niemueller [www.niemueller.de]
|
|
*/
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
#include <config.h>
|
|
#endif
|
|
|
|
#include <string.h>
|
|
#include <glib/gi18n.h>
|
|
#include <gtk/gtk.h>
|
|
#include <libgnomeui/libgnomeui.h>
|
|
#include <gconf/gconf-client.h>
|
|
#include <gnome-keyring.h>
|
|
|
|
#include "gnome-two-password-dialog.h"
|
|
|
|
#define VPN_SERVICE "org.freedesktop.NetworkManager.openvpn"
|
|
// MUST be the same as in gnome/applet/applet.h
|
|
// A real fix for this is needed by giving more information to auth apps
|
|
#define GCONF_PATH_VPN_CONNECTIONS "/system/networking/vpn_connections"
|
|
|
|
static GSList *
|
|
lookup_pass (const char *vpn_name, const char *vpn_service, gboolean *is_session)
|
|
{
|
|
GSList *passwords;
|
|
GList *keyring_result;
|
|
GList *keyring_i;
|
|
|
|
char *password = NULL;
|
|
char *certpass = NULL;
|
|
|
|
passwords = NULL;
|
|
|
|
if (gnome_keyring_find_network_password_sync (g_get_user_name (), /* user */
|
|
NULL, /* domain */
|
|
vpn_name, /* server */
|
|
NULL, /* object */
|
|
vpn_service, /* protocol */
|
|
NULL, /* authtype */
|
|
0, /* port */
|
|
&keyring_result) != GNOME_KEYRING_RESULT_OK)
|
|
return FALSE;
|
|
|
|
*is_session = FALSE;
|
|
|
|
// Go through all passwords and assign to appropriate variable
|
|
for (keyring_i = keyring_result; keyring_i != NULL; keyring_i = g_list_next (keyring_i)) {
|
|
|
|
GnomeKeyringNetworkPasswordData *data = keyring_i->data;
|
|
|
|
if (strcmp (data->object, "password") == 0) {
|
|
password = data->password;
|
|
} else if (strcmp (data->object, "certpass") == 0) {
|
|
certpass = data->password;
|
|
}
|
|
|
|
if (strcmp (data->keyring, "session") == 0)
|
|
*is_session = TRUE;
|
|
|
|
}
|
|
|
|
|
|
if (password != NULL) {
|
|
passwords = g_slist_append (passwords, g_strdup (password));
|
|
} else {
|
|
passwords = g_slist_append (passwords, g_strdup (""));
|
|
}
|
|
|
|
if (certpass != NULL) {
|
|
passwords = g_slist_append (passwords, g_strdup (certpass));
|
|
} else {
|
|
passwords = g_slist_append (passwords, g_strdup (""));
|
|
}
|
|
|
|
gnome_keyring_network_password_list_free (keyring_result);
|
|
|
|
return passwords;
|
|
}
|
|
|
|
static void save_vpn_password (const char *vpn_name, const char *vpn_service, const char *keyring,
|
|
const char *password, const char *certpass)
|
|
{
|
|
guint32 item_id;
|
|
GnomeKeyringResult keyring_result;
|
|
|
|
if ( password != NULL) {
|
|
keyring_result = gnome_keyring_set_network_password_sync (keyring,
|
|
g_get_user_name (),
|
|
NULL,
|
|
vpn_name,
|
|
"password",
|
|
vpn_service,
|
|
NULL,
|
|
0,
|
|
password,
|
|
&item_id);
|
|
if (keyring_result != GNOME_KEYRING_RESULT_OK) {
|
|
g_warning ("Couldn't store password in keyring, code %d", (int) keyring_result);
|
|
}
|
|
}
|
|
|
|
if ( certpass != NULL) {
|
|
keyring_result = gnome_keyring_set_network_password_sync (keyring,
|
|
g_get_user_name (),
|
|
NULL,
|
|
vpn_name,
|
|
"certpass",
|
|
vpn_service,
|
|
NULL,
|
|
0,
|
|
certpass,
|
|
&item_id);
|
|
if (keyring_result != GNOME_KEYRING_RESULT_OK) {
|
|
g_warning ("Couldn't store certpass in keyring, code %d", (int) keyring_result);
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
|
|
/** Checks if a key is encrypted
|
|
* The key file is read and it is checked if it contains a line reading
|
|
* Proc-Type: 4,ENCRYPTED
|
|
* This is defined in RFC 1421 (PEM)
|
|
* @param filename the path to the file
|
|
* @return returns true if the key is encrypted, false otherwise
|
|
*/
|
|
static gboolean
|
|
pem_is_encrypted(const char *filename)
|
|
{
|
|
|
|
GIOChannel *pem_chan;
|
|
char *str = NULL;
|
|
gboolean encrypted = FALSE;
|
|
|
|
pem_chan = g_io_channel_new_file (filename, "r", NULL);
|
|
|
|
if ( pem_chan == NULL ) {
|
|
// We don't know
|
|
return FALSE;
|
|
}
|
|
|
|
while ( ! encrypted && (g_io_channel_read_line (pem_chan, &str, NULL, NULL, NULL) != G_IO_STATUS_EOF) ) {
|
|
if ( strstr (str, "Proc-Type: 4,ENCRYPTED") == str ) {
|
|
// encrypted!
|
|
encrypted = TRUE;
|
|
}
|
|
|
|
g_free (str);
|
|
}
|
|
|
|
return encrypted;
|
|
}
|
|
|
|
|
|
static GSList *
|
|
get_passwords (const char *vpn_name,
|
|
const char *vpn_service,
|
|
gboolean retry,
|
|
gboolean need_password,
|
|
gboolean need_certpass)
|
|
{
|
|
GSList *result;
|
|
char *prompt;
|
|
GtkWidget *dialog;
|
|
char *keyring_password;
|
|
char *keyring_certpass;
|
|
gboolean keyring_is_session;
|
|
GSList *keyring_result;
|
|
GnomeTwoPasswordDialogRemember remember;
|
|
int num_passwords = 0;
|
|
|
|
result = NULL;
|
|
keyring_password = NULL;
|
|
keyring_certpass = NULL;
|
|
keyring_result = NULL;
|
|
|
|
g_return_val_if_fail (vpn_name != NULL, NULL);
|
|
|
|
/* Use the system user name, since the VPN might have a different user name */
|
|
if (!retry) {
|
|
if ((result = lookup_pass (vpn_name, vpn_service, &keyring_is_session)) != NULL) {
|
|
return result;
|
|
}
|
|
} else {
|
|
if ((keyring_result = lookup_pass (vpn_name, vpn_service, &keyring_is_session)) != NULL) {
|
|
keyring_password = g_strdup ((char *) keyring_result->data);
|
|
keyring_certpass = g_strdup ((char *) (g_slist_next (keyring_result))->data);
|
|
}
|
|
g_slist_foreach (keyring_result, (GFunc)g_free, NULL);
|
|
g_slist_free (keyring_result);
|
|
}
|
|
|
|
prompt = g_strdup_printf (_("You need to authenticate to access the Virtual Private Network '%s'."), vpn_name);
|
|
dialog = gnome_two_password_dialog_new (_("Authenticate VPN"), prompt, NULL, NULL, FALSE);
|
|
g_free (prompt);
|
|
|
|
gnome_two_password_dialog_set_show_username (GNOME_TWO_PASSWORD_DIALOG (dialog), FALSE);
|
|
gnome_two_password_dialog_set_show_userpass_buttons (GNOME_TWO_PASSWORD_DIALOG (dialog), FALSE);
|
|
gnome_two_password_dialog_set_show_domain (GNOME_TWO_PASSWORD_DIALOG (dialog), FALSE);
|
|
gnome_two_password_dialog_set_show_remember (GNOME_TWO_PASSWORD_DIALOG (dialog), TRUE);
|
|
|
|
if (need_password && need_certpass) {
|
|
gnome_two_password_dialog_set_show_password_secondary (GNOME_TWO_PASSWORD_DIALOG (dialog),
|
|
TRUE);
|
|
gnome_two_password_dialog_set_password_secondary_label (GNOME_TWO_PASSWORD_DIALOG (dialog),
|
|
_("Certificate pass_word:") );
|
|
|
|
/* if retrying, put in the passwords from the keyring */
|
|
if (keyring_password != NULL) {
|
|
gnome_two_password_dialog_set_password (GNOME_TWO_PASSWORD_DIALOG (dialog),
|
|
keyring_password);
|
|
}
|
|
if (keyring_certpass != NULL) {
|
|
gnome_two_password_dialog_set_password_secondary (GNOME_TWO_PASSWORD_DIALOG (dialog),
|
|
keyring_certpass);
|
|
}
|
|
} else {
|
|
gnome_two_password_dialog_set_show_password_secondary (GNOME_TWO_PASSWORD_DIALOG (dialog),
|
|
FALSE);
|
|
if (need_password) {
|
|
// defaults for label are ok
|
|
|
|
/* if retrying, put in the passwords from the keyring */
|
|
if (keyring_password != NULL) {
|
|
gnome_two_password_dialog_set_password (GNOME_TWO_PASSWORD_DIALOG (dialog),
|
|
keyring_password);
|
|
}
|
|
|
|
} else if (need_certpass) {
|
|
gnome_two_password_dialog_set_password_primary_label (GNOME_TWO_PASSWORD_DIALOG (dialog),
|
|
_("Certificate password:") );
|
|
/* if retrying, put in the passwords from the keyring */
|
|
if (keyring_certpass != NULL) {
|
|
gnome_two_password_dialog_set_password (GNOME_TWO_PASSWORD_DIALOG (dialog),
|
|
keyring_certpass);
|
|
}
|
|
}
|
|
}
|
|
|
|
/* use the same keyring storage options as from the items we put in the entry boxes */
|
|
remember = GNOME_TWO_PASSWORD_DIALOG_REMEMBER_NOTHING;
|
|
if (keyring_result != NULL) {
|
|
if (keyring_is_session)
|
|
remember = GNOME_TWO_PASSWORD_DIALOG_REMEMBER_SESSION;
|
|
else
|
|
remember = GNOME_TWO_PASSWORD_DIALOG_REMEMBER_FOREVER;
|
|
}
|
|
gnome_two_password_dialog_set_remember (GNOME_TWO_PASSWORD_DIALOG (dialog), remember);
|
|
|
|
gtk_widget_show (dialog);
|
|
|
|
if (gnome_two_password_dialog_run_and_block (GNOME_TWO_PASSWORD_DIALOG (dialog))) {
|
|
char *password = "unused";
|
|
char *certpass = "unused";
|
|
|
|
if (need_password && need_certpass) {
|
|
password = gnome_two_password_dialog_get_password (GNOME_TWO_PASSWORD_DIALOG (dialog));
|
|
certpass = gnome_two_password_dialog_get_password_secondary (GNOME_TWO_PASSWORD_DIALOG (dialog));
|
|
} else {
|
|
if (need_password) {
|
|
password = gnome_two_password_dialog_get_password (GNOME_TWO_PASSWORD_DIALOG (dialog));
|
|
} else if (need_certpass) {
|
|
certpass = gnome_two_password_dialog_get_password (GNOME_TWO_PASSWORD_DIALOG (dialog));
|
|
}
|
|
}
|
|
|
|
result = g_slist_append (result, g_strdup (password));
|
|
result = g_slist_append (result, g_strdup (certpass));
|
|
|
|
switch (gnome_two_password_dialog_get_remember (GNOME_TWO_PASSWORD_DIALOG (dialog))) {
|
|
case GNOME_TWO_PASSWORD_DIALOG_REMEMBER_SESSION:
|
|
save_vpn_password (vpn_name, vpn_service, "session", password, certpass);
|
|
break;
|
|
case GNOME_TWO_PASSWORD_DIALOG_REMEMBER_FOREVER:
|
|
save_vpn_password (vpn_name, vpn_service, NULL, password, certpass);
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
}
|
|
|
|
g_free (keyring_password);
|
|
g_free (keyring_certpass);
|
|
|
|
gtk_widget_destroy (dialog);
|
|
|
|
return result;
|
|
}
|
|
|
|
int
|
|
main (int argc, char *argv[])
|
|
{
|
|
GConfClient *gconf_client = NULL;
|
|
GConfValue *gconf_val = NULL;
|
|
gchar *gconf_key = NULL;
|
|
char *escaped_name;
|
|
gboolean needs_password = FALSE;
|
|
gboolean needs_certpass = FALSE;
|
|
gboolean valid_conn = FALSE;
|
|
GSList *i;
|
|
GSList *passwords;
|
|
gchar *key = NULL;
|
|
gchar *connection_type = NULL;
|
|
static gboolean retry = FALSE;
|
|
static gchar *vpn_name = NULL;
|
|
static gchar *vpn_service = NULL;
|
|
GError *error = NULL;
|
|
GOptionContext *context;
|
|
GnomeProgram *program = NULL;
|
|
int bytes_read;
|
|
GOptionEntry entries[] =
|
|
{
|
|
{ "reprompt", 'r', 0, G_OPTION_ARG_NONE, &retry, "Reprompt for passwords", NULL},
|
|
{ "name", 'n', 0, G_OPTION_ARG_STRING, &vpn_name, "Name of VPN connection", NULL},
|
|
{ "service", 's', 0, G_OPTION_ARG_STRING, &vpn_service, "VPN service type", NULL},
|
|
{ NULL }
|
|
};
|
|
char buf[1];
|
|
|
|
bindtextdomain (GETTEXT_PACKAGE, NULL);
|
|
bind_textdomain_codeset (GETTEXT_PACKAGE, "UTF-8");
|
|
textdomain (GETTEXT_PACKAGE);
|
|
|
|
passwords = NULL;
|
|
|
|
context = g_option_context_new ("- openvpn auth dialog");
|
|
g_option_context_add_main_entries (context, entries, GETTEXT_PACKAGE);
|
|
|
|
program = gnome_program_init ("nm-openvpn-auth-dialog", VERSION,
|
|
LIBGNOMEUI_MODULE,
|
|
argc, argv,
|
|
GNOME_PARAM_GOPTION_CONTEXT, context,
|
|
GNOME_PARAM_NONE);
|
|
|
|
if (vpn_name == NULL || vpn_service == NULL) {
|
|
fprintf (stderr, "Have to supply both name and service\n");
|
|
goto out;
|
|
}
|
|
|
|
if (strcmp (vpn_service, VPN_SERVICE) != 0) {
|
|
fprintf (stderr, "This dialog only works with the '%s' service\n", VPN_SERVICE);
|
|
goto out;
|
|
}
|
|
|
|
gconf_client = gconf_client_get_default();
|
|
escaped_name = gconf_escape_key (vpn_name, strlen (vpn_name));
|
|
gconf_key = g_strdup_printf ("%s/%s/vpn_data", GCONF_PATH_VPN_CONNECTIONS, escaped_name);
|
|
if ( !(gconf_val = gconf_client_get (gconf_client, gconf_key, NULL)) ||
|
|
!(gconf_val->type == GCONF_VALUE_LIST) ||
|
|
!(gconf_value_get_list_type (gconf_val) == GCONF_VALUE_STRING)) {
|
|
|
|
if (gconf_val)
|
|
gconf_value_free (gconf_val);
|
|
g_free (gconf_key);
|
|
goto out;
|
|
}
|
|
g_free (gconf_key);
|
|
|
|
valid_conn = TRUE;
|
|
|
|
for (i = gconf_value_get_list (gconf_val); i != NULL; i = g_slist_next (i)) {
|
|
const char *gkey = gconf_value_get_string ((GConfValue *)i->data);
|
|
const char *gval = NULL;
|
|
|
|
i = g_slist_next (i);
|
|
if (i != NULL) {
|
|
gval = gconf_value_get_string ((GConfValue *)i->data);
|
|
}
|
|
|
|
if ( gkey != NULL ) {
|
|
if ( strcmp (gkey, "connection-type") == 0 ) {
|
|
connection_type = g_strdup (gval);
|
|
if ( (strcmp (gval, "password") == 0) ||
|
|
(strcmp (gval, "x509userpass") == 0) ) {
|
|
needs_password = TRUE;
|
|
}
|
|
} else if ( strcmp (gkey, "key") == 0 ) {
|
|
key = g_strdup (gval);
|
|
}
|
|
}
|
|
}
|
|
gconf_value_free (gconf_val);
|
|
|
|
if ( (connection_type != NULL) && (key != NULL) ) {
|
|
if ( (strcmp (connection_type, "x509") == 0) ||
|
|
(strcmp (connection_type, "x509userpass") == 0) ) {
|
|
needs_certpass = pem_is_encrypted (key);
|
|
}
|
|
}
|
|
|
|
if ( needs_password || needs_certpass ) {
|
|
passwords = get_passwords (vpn_name, vpn_service, retry, needs_password, needs_certpass);
|
|
if (passwords == NULL)
|
|
goto out;
|
|
|
|
/* dump the passwords to stdout */
|
|
for (i = passwords; i != NULL; i = g_slist_next (i)) {
|
|
char *password = (char *) i->data;
|
|
printf ("%s\n", password);
|
|
}
|
|
|
|
g_slist_foreach (passwords, (GFunc)g_free, NULL);
|
|
g_slist_free (passwords);
|
|
|
|
} else {
|
|
printf ("No password needed\nNo certpass needed\n");
|
|
}
|
|
|
|
printf ("\n\n");
|
|
/* for good measure, flush stdout since Kansas is going Bye-Bye */
|
|
fflush (stdout);
|
|
|
|
/* wait for data on stdin */
|
|
bytes_read = fread (buf, sizeof (char), sizeof (buf), stdin);
|
|
|
|
out:
|
|
if (gconf_client)
|
|
g_object_unref (gconf_client);
|
|
|
|
g_object_unref (program);
|
|
|
|
g_free (connection_type);
|
|
g_free (key);
|
|
|
|
if ( ! valid_conn ) {
|
|
return 1;
|
|
} else if ( needs_password ) {
|
|
return (passwords != NULL) ? 0 : 1;
|
|
} else {
|
|
return 0;
|
|
}
|
|
}
|