/* -*- Mode: C; tab-width: 4; indent-tabs-mode: t; c-basic-offset: 4 -*- */ /* NetworkManager Applet -- allow user control over networking * * Dan Williams * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License along * with this program; if not, write to the Free Software Foundation, Inc., * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. * * Copyright 2007 - 2014 Red Hat, Inc. */ #include #include #include "helpers.h" #include "nma-ui-utils.h" #include "ui-helpers.h" #include "ws-wpa-psk.h" #include "wireless-security.h" #define WPA_PMK_LEN 32 struct _WirelessSecurityWPAPSK { GtkGrid parent; GtkEntry *password_entry; GtkLabel *password_label; GtkCheckButton *show_password_check; GtkComboBox *type_combo; GtkLabel *type_label; }; static void wireless_security_iface_init (WirelessSecurityInterface *); G_DEFINE_TYPE_WITH_CODE (WirelessSecurityWPAPSK, ws_wpa_psk, GTK_TYPE_GRID, G_IMPLEMENT_INTERFACE (wireless_security_get_type (), wireless_security_iface_init)); static void show_toggled_cb (WirelessSecurityWPAPSK *self) { gboolean visible; visible = gtk_check_button_get_active (GTK_CHECK_BUTTON (self->show_password_check)); gtk_entry_set_visibility (self->password_entry, visible); } static gboolean validate (WirelessSecurity *security, GError **error) { WirelessSecurityWPAPSK *self = WS_WPA_PSK (security); NMSettingSecretFlags secret_flags; const char *key; gsize len; int i; secret_flags = nma_utils_menu_to_secret_flags (GTK_WIDGET (self->password_entry)); if (secret_flags & NM_SETTING_SECRET_FLAG_NOT_SAVED) { widget_unset_error (GTK_WIDGET (self->password_entry)); return TRUE; } key = gtk_editable_get_text (GTK_EDITABLE (self->password_entry)); len = key ? strlen (key) : 0; if ((len < 8) || (len > 64)) { widget_set_error (GTK_WIDGET (self->password_entry)); g_set_error (error, NMA_ERROR, NMA_ERROR_GENERIC, _("invalid wpa-psk: invalid key-length %zu. Must be [8,63] bytes or 64 hex digits"), len); return FALSE; } if (len == 64) { /* Hex PSK */ for (i = 0; i < len; i++) { if (!isxdigit (key[i])) { widget_set_error (GTK_WIDGET (self->password_entry)); g_set_error_literal (error, NMA_ERROR, NMA_ERROR_GENERIC, _("invalid wpa-psk: cannot interpret key with 64 bytes as hex")); return FALSE; } } } widget_unset_error (GTK_WIDGET (self->password_entry)); /* passphrase can be between 8 and 63 characters inclusive */ return TRUE; } static void add_to_size_group (WirelessSecurity *security, GtkSizeGroup *group) { WirelessSecurityWPAPSK *self = WS_WPA_PSK (security); gtk_size_group_add_widget (group, GTK_WIDGET (self->type_label)); gtk_size_group_add_widget (group, GTK_WIDGET (self->password_label)); } static void fill_connection (WirelessSecurity *security, NMConnection *connection) { WirelessSecurityWPAPSK *self = WS_WPA_PSK (security); const char *key; NMSettingWireless *s_wireless; NMSettingWirelessSecurity *s_wireless_sec; NMSettingSecretFlags secret_flags; const char *mode; gboolean is_adhoc = FALSE; s_wireless = nm_connection_get_setting_wireless (connection); g_assert (s_wireless); mode = nm_setting_wireless_get_mode (s_wireless); if (mode && !strcmp (mode, "adhoc")) is_adhoc = TRUE; /* Blow away the old security setting by adding a clear one */ s_wireless_sec = (NMSettingWirelessSecurity *) nm_setting_wireless_security_new (); nm_connection_add_setting (connection, (NMSetting *) s_wireless_sec); key = gtk_editable_get_text (GTK_EDITABLE (self->password_entry)); g_object_set (s_wireless_sec, NM_SETTING_WIRELESS_SECURITY_PSK, key, NULL); /* Save PSK_FLAGS to the connection */ secret_flags = nma_utils_menu_to_secret_flags (GTK_WIDGET (self->password_entry)); nm_setting_set_secret_flags (NM_SETTING (s_wireless_sec), NM_SETTING_WIRELESS_SECURITY_PSK, secret_flags, NULL); /* Update secret flags and popup when editing the connection */ nma_utils_update_password_storage (GTK_WIDGET (self->password_entry), secret_flags, NM_SETTING (s_wireless_sec), NM_SETTING_WIRELESS_SECURITY_PSK); wireless_security_clear_ciphers (connection); if (is_adhoc) { /* Ad-Hoc settings as specified by the supplicant */ g_object_set (s_wireless_sec, NM_SETTING_WIRELESS_SECURITY_KEY_MGMT, "wpa-none", NULL); nm_setting_wireless_security_add_proto (s_wireless_sec, "wpa"); nm_setting_wireless_security_add_pairwise (s_wireless_sec, "none"); /* Ad-hoc can only have _one_ group cipher... default to TKIP to be more * compatible for now. Maybe we'll support selecting CCMP later. */ nm_setting_wireless_security_add_group (s_wireless_sec, "tkip"); } else { g_object_set (s_wireless_sec, NM_SETTING_WIRELESS_SECURITY_KEY_MGMT, "wpa-psk", NULL); /* Just leave ciphers and protocol empty, the supplicant will * figure that out magically based on the AP IEs and card capabilities. */ } } static gboolean adhoc_compatible (WirelessSecurity *security) { return FALSE; } static void changed_cb (WirelessSecurityWPAPSK *self) { wireless_security_notify_changed ((WirelessSecurity *) self); } void ws_wpa_psk_init (WirelessSecurityWPAPSK *self) { gtk_widget_init_template (GTK_WIDGET (self)); } void ws_wpa_psk_class_init (WirelessSecurityWPAPSKClass *klass) { GtkWidgetClass *widget_class = GTK_WIDGET_CLASS (klass); gtk_widget_class_set_template_from_resource (widget_class, "/org/gnome/Settings/network/ws-wpa-psk.ui"); gtk_widget_class_bind_template_child (widget_class, WirelessSecurityWPAPSK, password_entry); gtk_widget_class_bind_template_child (widget_class, WirelessSecurityWPAPSK, password_label); gtk_widget_class_bind_template_child (widget_class, WirelessSecurityWPAPSK, show_password_check); gtk_widget_class_bind_template_child (widget_class, WirelessSecurityWPAPSK, type_combo); gtk_widget_class_bind_template_child (widget_class, WirelessSecurityWPAPSK, type_label); } static void wireless_security_iface_init (WirelessSecurityInterface *iface) { iface->validate = validate; iface->add_to_size_group = add_to_size_group; iface->fill_connection = fill_connection; iface->adhoc_compatible = adhoc_compatible; } WirelessSecurityWPAPSK * ws_wpa_psk_new (NMConnection *connection) { WirelessSecurityWPAPSK *self; NMSetting *setting = NULL; self = g_object_new (ws_wpa_psk_get_type (), NULL); g_signal_connect_swapped (self->password_entry, "changed", G_CALLBACK (changed_cb), self); gtk_editable_set_width_chars (GTK_EDITABLE (self->password_entry), 28); /* Create password-storage popup menu for password entry under entry's secondary icon */ if (connection) setting = (NMSetting *) nm_connection_get_setting_wireless_security (connection); nma_utils_setup_password_storage (GTK_WIDGET (self->password_entry), 0, setting, NM_SETTING_WIRELESS_SECURITY_PSK, FALSE, FALSE); /* Fill secrets, if any */ if (connection) { helper_fill_secret_entry (connection, self->password_entry, NM_TYPE_SETTING_WIRELESS_SECURITY, (HelperSecretFunc) nm_setting_wireless_security_get_psk); } g_signal_connect_swapped (self->show_password_check, "toggled", G_CALLBACK (show_toggled_cb), self); /* Hide WPA/RSN for now since this can be autodetected by NM and the * supplicant when connecting to the AP. */ gtk_widget_hide (GTK_WIDGET (self->type_combo)); gtk_widget_hide (GTK_WIDGET (self->type_label)); return self; }