NetworkManager/vpn-daemons/openvpn/auth-dialog/main.c
Dan Williams 5721205385 2006-12-07 Dan Williams <dcbw@redhat.com>
Patch from Christian Persch <chpe@gnome.org>

	* auth-dialog/main.c
		- Fix memleak by unrefing the GnomeProgram instance (Gnome.org #383110)


git-svn-id: http://svn-archive.gnome.org/svn/NetworkManager/trunk@2174 4912f4e0-d625-0410-9fb7-b9a5a253dbdc
2006-12-07 22:48:40 +00:00

453 lines
14 KiB
C

/* NetworkManager Wireless Applet -- Display wireless access points and allow user control
*
* Dan Williams <dcbw@redhat.com>
* Tim Niemueller <tim@niemueller.de>
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
*
* (C) Copyright 2004 Red Hat, Inc.
* 2005 Tim Niemueller [www.niemueller.de]
*/
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif
#include <string.h>
#include <glib/gi18n.h>
#include <gtk/gtk.h>
#include <libgnomeui/libgnomeui.h>
#include <gconf/gconf-client.h>
#include <gnome-keyring.h>
#include "gnome-two-password-dialog.h"
#define VPN_SERVICE "org.freedesktop.NetworkManager.openvpn"
// MUST be the same as in gnome/applet/applet.h
// A real fix for this is needed by giving more information to auth apps
#define GCONF_PATH_VPN_CONNECTIONS "/system/networking/vpn_connections"
static GSList *
lookup_pass (const char *vpn_name, const char *vpn_service, gboolean *is_session)
{
GSList *passwords;
GList *keyring_result;
GList *keyring_i;
char *password = NULL;
char *certpass = NULL;
passwords = NULL;
if (gnome_keyring_find_network_password_sync (g_get_user_name (), /* user */
NULL, /* domain */
vpn_name, /* server */
NULL, /* object */
vpn_service, /* protocol */
NULL, /* authtype */
0, /* port */
&keyring_result) != GNOME_KEYRING_RESULT_OK)
return FALSE;
*is_session = FALSE;
// Go through all passwords and assign to appropriate variable
for (keyring_i = keyring_result; keyring_i != NULL; keyring_i = g_list_next (keyring_i)) {
GnomeKeyringNetworkPasswordData *data = keyring_i->data;
if (strcmp (data->object, "password") == 0) {
password = data->password;
} else if (strcmp (data->object, "certpass") == 0) {
certpass = data->password;
}
if (strcmp (data->keyring, "session") == 0)
*is_session = TRUE;
}
if (password != NULL) {
passwords = g_slist_append (passwords, g_strdup (password));
} else {
passwords = g_slist_append (passwords, g_strdup (""));
}
if (certpass != NULL) {
passwords = g_slist_append (passwords, g_strdup (certpass));
} else {
passwords = g_slist_append (passwords, g_strdup (""));
}
gnome_keyring_network_password_list_free (keyring_result);
return passwords;
}
static void save_vpn_password (const char *vpn_name, const char *vpn_service, const char *keyring,
const char *password, const char *certpass)
{
guint32 item_id;
GnomeKeyringResult keyring_result;
if ( password != NULL) {
keyring_result = gnome_keyring_set_network_password_sync (keyring,
g_get_user_name (),
NULL,
vpn_name,
"password",
vpn_service,
NULL,
0,
password,
&item_id);
if (keyring_result != GNOME_KEYRING_RESULT_OK) {
g_warning ("Couldn't store password in keyring, code %d", (int) keyring_result);
}
}
if ( certpass != NULL) {
keyring_result = gnome_keyring_set_network_password_sync (keyring,
g_get_user_name (),
NULL,
vpn_name,
"certpass",
vpn_service,
NULL,
0,
certpass,
&item_id);
if (keyring_result != GNOME_KEYRING_RESULT_OK) {
g_warning ("Couldn't store certpass in keyring, code %d", (int) keyring_result);
}
}
}
/** Checks if a key is encrypted
* The key file is read and it is checked if it contains a line reading
* Proc-Type: 4,ENCRYPTED
* This is defined in RFC 1421 (PEM)
* @param filename the path to the file
* @return returns true if the key is encrypted, false otherwise
*/
static gboolean
pem_is_encrypted(const char *filename)
{
GIOChannel *pem_chan;
char *str = NULL;
gboolean encrypted = FALSE;
pem_chan = g_io_channel_new_file (filename, "r", NULL);
if ( pem_chan == NULL ) {
// We don't know
return FALSE;
}
while ( ! encrypted && (g_io_channel_read_line (pem_chan, &str, NULL, NULL, NULL) != G_IO_STATUS_EOF) ) {
if ( strstr (str, "Proc-Type: 4,ENCRYPTED") == str ) {
// encrypted!
encrypted = TRUE;
}
g_free (str);
}
return encrypted;
}
static GSList *
get_passwords (const char *vpn_name,
const char *vpn_service,
gboolean retry,
gboolean need_password,
gboolean need_certpass)
{
GSList *result;
char *prompt;
GtkWidget *dialog;
char *keyring_password;
char *keyring_certpass;
gboolean keyring_is_session;
GSList *keyring_result;
GnomeTwoPasswordDialogRemember remember;
int num_passwords = 0;
result = NULL;
keyring_password = NULL;
keyring_certpass = NULL;
keyring_result = NULL;
g_return_val_if_fail (vpn_name != NULL, NULL);
/* Use the system user name, since the VPN might have a different user name */
if (!retry) {
if ((result = lookup_pass (vpn_name, vpn_service, &keyring_is_session)) != NULL) {
return result;
}
} else {
if ((keyring_result = lookup_pass (vpn_name, vpn_service, &keyring_is_session)) != NULL) {
keyring_password = g_strdup ((char *) keyring_result->data);
keyring_certpass = g_strdup ((char *) (g_slist_next (keyring_result))->data);
}
g_slist_foreach (keyring_result, (GFunc)g_free, NULL);
g_slist_free (keyring_result);
}
prompt = g_strdup_printf (_("You need to authenticate to access the Virtual Private Network '%s'."), vpn_name);
dialog = gnome_two_password_dialog_new (_("Authenticate VPN"), prompt, NULL, NULL, FALSE);
g_free (prompt);
gnome_two_password_dialog_set_show_username (GNOME_TWO_PASSWORD_DIALOG (dialog), FALSE);
gnome_two_password_dialog_set_show_userpass_buttons (GNOME_TWO_PASSWORD_DIALOG (dialog), FALSE);
gnome_two_password_dialog_set_show_domain (GNOME_TWO_PASSWORD_DIALOG (dialog), FALSE);
gnome_two_password_dialog_set_show_remember (GNOME_TWO_PASSWORD_DIALOG (dialog), TRUE);
if (need_password && need_certpass) {
gnome_two_password_dialog_set_show_password_secondary (GNOME_TWO_PASSWORD_DIALOG (dialog),
TRUE);
gnome_two_password_dialog_set_password_secondary_label (GNOME_TWO_PASSWORD_DIALOG (dialog),
_("Certificate pass_word:") );
/* if retrying, put in the passwords from the keyring */
if (keyring_password != NULL) {
gnome_two_password_dialog_set_password (GNOME_TWO_PASSWORD_DIALOG (dialog),
keyring_password);
}
if (keyring_certpass != NULL) {
gnome_two_password_dialog_set_password_secondary (GNOME_TWO_PASSWORD_DIALOG (dialog),
keyring_certpass);
}
} else {
gnome_two_password_dialog_set_show_password_secondary (GNOME_TWO_PASSWORD_DIALOG (dialog),
FALSE);
if (need_password) {
// defaults for label are ok
/* if retrying, put in the passwords from the keyring */
if (keyring_password != NULL) {
gnome_two_password_dialog_set_password (GNOME_TWO_PASSWORD_DIALOG (dialog),
keyring_password);
}
} else if (need_certpass) {
gnome_two_password_dialog_set_password_primary_label (GNOME_TWO_PASSWORD_DIALOG (dialog),
_("Certificate password:") );
/* if retrying, put in the passwords from the keyring */
if (keyring_certpass != NULL) {
gnome_two_password_dialog_set_password (GNOME_TWO_PASSWORD_DIALOG (dialog),
keyring_certpass);
}
}
}
/* use the same keyring storage options as from the items we put in the entry boxes */
remember = GNOME_TWO_PASSWORD_DIALOG_REMEMBER_NOTHING;
if (keyring_result != NULL) {
if (keyring_is_session)
remember = GNOME_TWO_PASSWORD_DIALOG_REMEMBER_SESSION;
else
remember = GNOME_TWO_PASSWORD_DIALOG_REMEMBER_FOREVER;
}
gnome_two_password_dialog_set_remember (GNOME_TWO_PASSWORD_DIALOG (dialog), remember);
gtk_widget_show (dialog);
if (gnome_two_password_dialog_run_and_block (GNOME_TWO_PASSWORD_DIALOG (dialog))) {
char *password = "unused";
char *certpass = "unused";
if (need_password && need_certpass) {
password = gnome_two_password_dialog_get_password (GNOME_TWO_PASSWORD_DIALOG (dialog));
certpass = gnome_two_password_dialog_get_password_secondary (GNOME_TWO_PASSWORD_DIALOG (dialog));
} else {
if (need_password) {
password = gnome_two_password_dialog_get_password (GNOME_TWO_PASSWORD_DIALOG (dialog));
} else if (need_certpass) {
certpass = gnome_two_password_dialog_get_password (GNOME_TWO_PASSWORD_DIALOG (dialog));
}
}
result = g_slist_append (result, g_strdup (password));
result = g_slist_append (result, g_strdup (certpass));
switch (gnome_two_password_dialog_get_remember (GNOME_TWO_PASSWORD_DIALOG (dialog))) {
case GNOME_TWO_PASSWORD_DIALOG_REMEMBER_SESSION:
save_vpn_password (vpn_name, vpn_service, "session", password, certpass);
break;
case GNOME_TWO_PASSWORD_DIALOG_REMEMBER_FOREVER:
save_vpn_password (vpn_name, vpn_service, NULL, password, certpass);
break;
default:
break;
}
}
g_free (keyring_password);
g_free (keyring_certpass);
gtk_widget_destroy (dialog);
return result;
}
int
main (int argc, char *argv[])
{
GConfClient *gconf_client = NULL;
GConfValue *gconf_val = NULL;
gchar *gconf_key = NULL;
char *escaped_name;
gboolean needs_password = FALSE;
gboolean needs_certpass = FALSE;
gboolean valid_conn = FALSE;
GSList *i;
GSList *passwords;
gchar *key = NULL;
gchar *connection_type = NULL;
static gboolean retry = FALSE;
static gchar *vpn_name = NULL;
static gchar *vpn_service = NULL;
GError *error = NULL;
GOptionContext *context;
GnomeProgram *program = NULL;
int bytes_read;
GOptionEntry entries[] =
{
{ "reprompt", 'r', 0, G_OPTION_ARG_NONE, &retry, "Reprompt for passwords", NULL},
{ "name", 'n', 0, G_OPTION_ARG_STRING, &vpn_name, "Name of VPN connection", NULL},
{ "service", 's', 0, G_OPTION_ARG_STRING, &vpn_service, "VPN service type", NULL},
{ NULL }
};
char buf[1];
bindtextdomain (GETTEXT_PACKAGE, NULL);
bind_textdomain_codeset (GETTEXT_PACKAGE, "UTF-8");
textdomain (GETTEXT_PACKAGE);
passwords = NULL;
context = g_option_context_new ("- openvpn auth dialog");
g_option_context_add_main_entries (context, entries, GETTEXT_PACKAGE);
program = gnome_program_init ("nm-openvpn-auth-dialog", VERSION,
LIBGNOMEUI_MODULE,
argc, argv,
GNOME_PARAM_GOPTION_CONTEXT, context,
GNOME_PARAM_NONE);
if (vpn_name == NULL || vpn_service == NULL) {
fprintf (stderr, "Have to supply both name and service\n");
goto out;
}
if (strcmp (vpn_service, VPN_SERVICE) != 0) {
fprintf (stderr, "This dialog only works with the '%s' service\n", VPN_SERVICE);
goto out;
}
gconf_client = gconf_client_get_default();
escaped_name = gconf_escape_key (vpn_name, strlen (vpn_name));
gconf_key = g_strdup_printf ("%s/%s/vpn_data", GCONF_PATH_VPN_CONNECTIONS, escaped_name);
if ( !(gconf_val = gconf_client_get (gconf_client, gconf_key, NULL)) ||
!(gconf_val->type == GCONF_VALUE_LIST) ||
!(gconf_value_get_list_type (gconf_val) == GCONF_VALUE_STRING)) {
if (gconf_val)
gconf_value_free (gconf_val);
g_free (gconf_key);
goto out;
}
g_free (gconf_key);
valid_conn = TRUE;
for (i = gconf_value_get_list (gconf_val); i != NULL; i = g_slist_next (i)) {
const char *gkey = gconf_value_get_string ((GConfValue *)i->data);
const char *gval = NULL;
i = g_slist_next (i);
if (i != NULL) {
gval = gconf_value_get_string ((GConfValue *)i->data);
}
if ( gkey != NULL ) {
if ( strcmp (gkey, "connection-type") == 0 ) {
connection_type = g_strdup (gval);
if ( (strcmp (gval, "password") == 0) ||
(strcmp (gval, "x509userpass") == 0) ) {
needs_password = TRUE;
}
} else if ( strcmp (gkey, "key") == 0 ) {
key = g_strdup (gval);
}
}
}
gconf_value_free (gconf_val);
if ( (connection_type != NULL) && (key != NULL) ) {
if ( (strcmp (connection_type, "x509") == 0) ||
(strcmp (connection_type, "x509userpass") == 0) ) {
needs_certpass = pem_is_encrypted (key);
}
}
if ( needs_password || needs_certpass ) {
passwords = get_passwords (vpn_name, vpn_service, retry, needs_password, needs_certpass);
if (passwords == NULL)
goto out;
/* dump the passwords to stdout */
for (i = passwords; i != NULL; i = g_slist_next (i)) {
char *password = (char *) i->data;
printf ("%s\n", password);
}
g_slist_foreach (passwords, (GFunc)g_free, NULL);
g_slist_free (passwords);
} else {
printf ("No password needed\nNo certpass needed\n");
}
printf ("\n\n");
/* for good measure, flush stdout since Kansas is going Bye-Bye */
fflush (stdout);
/* wait for data on stdin */
bytes_read = fread (buf, sizeof (char), sizeof (buf), stdin);
out:
if (gconf_client)
g_object_unref (gconf_client);
g_object_unref (program);
g_free (connection_type);
g_free (key);
if ( ! valid_conn ) {
return 1;
} else if ( needs_password ) {
return (passwords != NULL) ? 0 : 1;
} else {
return 0;
}
}