You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
4525 lines
227 KiB
4525 lines
227 KiB
/***************************************************************************
|
|
* Copyright (C) 2004 by Christoph Thielecke *
|
|
* crissi99@gmx.de *
|
|
* *
|
|
* This program is free software; you can redistribute it and/or modify *
|
|
* it under the terms of the GNU General Public License as published by *
|
|
* the Free Software Foundation; either version 2 of the License, or *
|
|
* (at your option) any later version. *
|
|
* *
|
|
* This program is distributed in the hope that it will be useful, *
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of *
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the *
|
|
* GNU General Public License for more details. *
|
|
* *
|
|
* You should have received a copy of the GNU General Public License *
|
|
* along with this program; if not, write to the *
|
|
* Free Software Foundation, Inc., *
|
|
* 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. *
|
|
***************************************************************************/
|
|
|
|
//BEGIN INCLUDES
|
|
#include "kvpncconfig.h"
|
|
#include "utils.h"
|
|
#include "kvpncimportprofileselectiondialog.h"
|
|
#include <kstandarddirs.h>
|
|
#include <tdemessagebox.h>
|
|
#include <tdelistview.h>
|
|
#include <tdelocale.h>
|
|
#include <iostream>
|
|
#include <kstandarddirs.h>
|
|
#include <tqdom.h>
|
|
#include <tqdir.h>
|
|
#include <tqlistview.h>
|
|
#include <tqcheckbox.h>
|
|
#include <tqcursor.h>
|
|
#include <tqregexp.h>
|
|
#include <kpushbutton.h>
|
|
#include <tdelistview.h>
|
|
#include <kurl.h>
|
|
#include <kinputdialog.h>
|
|
#include <klineedit.h>
|
|
//END INCLUDES
|
|
|
|
KVpncConfig::KVpncConfig(TQWidget *parent,KStatusBar *statusbar)
|
|
{
|
|
this->parent = parent;
|
|
this->statusbar = statusbar;
|
|
|
|
pathToVpnc = "";
|
|
pathToCiscoVpnc = "";
|
|
pathToRacoon = "";
|
|
pathToRacoonctl = "";
|
|
pathToSetkey = "";
|
|
pathToIpsec = "";
|
|
pathToPppd="";
|
|
pathToPptp="";
|
|
pathToL2tpd="";
|
|
pathToXl2tpd="";
|
|
pathToSsh="/usr/bin/ssh";
|
|
pathToKill="";
|
|
pathToKillall="";
|
|
pathToPing="";
|
|
pathToOpenvpn="";
|
|
pathToIp="/sbin/ip";
|
|
pathToIfconfig="/sbin/ifconfig";
|
|
pathToRoute="/sbin/route";
|
|
pathToNetstat="/bin/netstat";
|
|
pathToL2tpd="/usr/sbin/l2tpd";
|
|
pathToPkcs11Tool="/usr/bin/pkcs11-tool";
|
|
pathToVtund="/usr/sbin/vtund";
|
|
pathToCiscoCertMgr="/usr/local/bin/cisco_cert_mgr";
|
|
pathToTail="/usr/bin/tail";
|
|
pathToSsh="/usr/bin/ssh";
|
|
pathToKsshAskpass="/usr/bin/ksshaskpass";
|
|
pathToGnomeSshAskpass="/usr/lib/openssh/gnome-ssh-askpass";
|
|
AutoConnectProfile="";
|
|
Vpnc_pid_file = "";
|
|
Pppd_pid_file = "";
|
|
lastProfile = "";
|
|
logfileName = "";
|
|
InterpreterShell="/bin/bash";
|
|
|
|
TmpPassword="";
|
|
TmpGroupPassword="";
|
|
TmpUsername="";
|
|
TmpPrivKeyPassStr="";
|
|
TmpGatewayIP="";
|
|
TmpXauthInterPasscode="";
|
|
TmpPrivateKeyPass="";
|
|
TmpHttpProxyPassword="";
|
|
DnsDevice = "";
|
|
|
|
OldDefaultGw="";
|
|
OldDefaultDev="";
|
|
|
|
connectSleepDelay = 15;
|
|
connectSleepRetry = 0;
|
|
tryConnectTimeout = 10;
|
|
runningCheckCounter = 0;
|
|
runningCheckTimeout = 60;
|
|
mainwindow_pos_x=0;
|
|
mainwindow_pos_y=0;
|
|
mainwindow_height=200;
|
|
mainwindow_width=400;
|
|
AuthRetryCount=0;
|
|
PppdKernelLogLevel=0;
|
|
maxConnectRetry=3;
|
|
currentConnectRetry=0;
|
|
|
|
OpenvpnManagementPort=2222;
|
|
|
|
minimizeAfterConnect = true;
|
|
//showDebugConsole = false;
|
|
useDefaultPaths = false;
|
|
writeLogFile = true;
|
|
useSilentQuit = false;
|
|
holdGeneratedScripts = true;
|
|
enableDebugPppd=false;
|
|
enableDebugPptpd=false;
|
|
enableDebugL2tpd=false;
|
|
enableDebugXl2tpd=false;
|
|
enableDebugXl2tpdNetwork=false;
|
|
enableDebugXl2tpdpacket=false;
|
|
enableDebugXl2tpdstate=false;
|
|
enableDebugXl2tpdtunnel=false;
|
|
enableDebugOpenvpn=false;
|
|
useColorizedLogOutput=true;
|
|
showInterfaceIPinTooltip=true;
|
|
dontQuitOnCloseEvent=true;
|
|
PppdDebugLevel = false;
|
|
doAutoConnectAtStartup=false;
|
|
useTDEwallet=true;
|
|
showStatusBar=true;
|
|
showToolBar=true;
|
|
firstUseOfTDEwallet=true;
|
|
shutdownIsCalled=false;
|
|
skipTDEwalletStoring = false;
|
|
hideOnCloseInfo = false;
|
|
enableFreeswanVerbose=false;
|
|
doKillL2tpdIfStillRunning=true;
|
|
doKillRacoonIfStillRunning=true;
|
|
hideMainWindow=false;
|
|
showInterfaceIPinTooltip = true;
|
|
showConnectionTimeInTooltip = true;
|
|
OpenvpnNeedSecurityParameter = false;
|
|
haveUserData=false;
|
|
prefDlgOpen=false;
|
|
|
|
VpncDebugLevel = 0;
|
|
RacoonDebugLevel = "info";
|
|
KvpncDebugLevel = 0;
|
|
OpenvpnDebugLevel =0;
|
|
LogViewerFontSize=0; // can be from -3 up to +3
|
|
|
|
DebugBackgroundcolor=black;
|
|
|
|
ToolList = new TQPtrList<ToolInfo>();
|
|
ToolList->setAutoDelete( TRUE );
|
|
|
|
AccountList = new TQPtrList<VpnAccountData>();
|
|
AccountList->setAutoDelete( TRUE ); // the list owns the objects
|
|
|
|
InfoLogColor=TQt::black;
|
|
ErrorLogColor=TQt::red;
|
|
SuccessLogColor=TQt::darkGreen;
|
|
DebugLogColor=TQt::yellow;
|
|
|
|
TDEStandardDirs *dirs = TDEGlobal::dirs();
|
|
logfileName = TQString(dirs->saveLocation( "data" ));
|
|
TQString logfilePath = TQString(logfileName + "/kvpnc/kvpnc.log");
|
|
logfile.setName( logfilePath );
|
|
logFileStream.setDevice( &logfile );
|
|
|
|
currentProfile=0L;
|
|
}
|
|
|
|
KVpncConfig::~KVpncConfig()
|
|
{
|
|
delete AccountList;
|
|
delete ToolList;
|
|
}
|
|
|
|
void KVpncConfig::setLogOutput(TQTextEdit *LogOutput)
|
|
{
|
|
this->LogOutput = LogOutput;
|
|
}
|
|
|
|
void KVpncConfig::appendLogEntry( TQString msg, LogType type )
|
|
{
|
|
|
|
// write to logfile
|
|
if ( writeLogFile )
|
|
{
|
|
if ( !logfile.isOpen() )
|
|
{
|
|
TDEStandardDirs * dirs = TDEGlobal::dirs();
|
|
TQString logfileName = dirs->saveLocation( "data" );
|
|
logfileName += "/kvpnc/kvpnc.log"; // /root.kde/share/apps/kvpnc.log
|
|
// KMessageBox::information( this, logfileName, "info" );
|
|
logfile.setName( logfileName );
|
|
if ( !logfile.open( IO_WriteOnly | IO_Append ) )
|
|
KMessageBox::error( 0, i18n( "Log file can not be opened!" ) );
|
|
else
|
|
{
|
|
// TQTextStream s( &logfile );
|
|
logFileStream << i18n( "Log session started at: " );
|
|
logFileStream << TQDateTime::currentDateTime().toString( Qt::TextDate );
|
|
logFileStream << "\n";
|
|
logfile.flush();
|
|
}
|
|
}
|
|
else
|
|
{
|
|
TQString date = TQDate().currentDate().toString(Qt::ISODate)+ " ";
|
|
TQString time = TQTime().currentTime().toString(Qt::ISODate)+ " ";
|
|
TQString prefix="";
|
|
switch ( type )
|
|
{
|
|
case info:
|
|
prefix=i18n("info")+": ";
|
|
break;
|
|
case remote:
|
|
prefix=i18n("remote")+": ";
|
|
break;
|
|
case error:
|
|
prefix=i18n("error")+": ";
|
|
break;
|
|
case success:
|
|
prefix=i18n("success")+": ";
|
|
break;
|
|
case debug:
|
|
prefix=i18n("debug")+": ";
|
|
break;
|
|
}
|
|
// appPointer->processEvents();
|
|
logFileStream << date << time << prefix << msg << "\n";
|
|
logfile.flush();
|
|
// appPointer->processEvents();
|
|
}
|
|
|
|
}
|
|
// write into debug console
|
|
TQString prefix="";
|
|
TQString postfix="";
|
|
|
|
// font size
|
|
prefix+="<font size=\""+TQString().setNum(LogViewerFontSize)+"\">";
|
|
postfix+="<\\font>";
|
|
|
|
if (useColorizedLogOutput)
|
|
prefix+="<font color=\"";
|
|
|
|
switch ( type )
|
|
{
|
|
case info:
|
|
if (useColorizedLogOutput)
|
|
{
|
|
prefix+=InfoLogColor.name();
|
|
prefix+="\">";
|
|
}
|
|
prefix+=i18n("info")+": ";
|
|
break;
|
|
case remote:
|
|
if (useColorizedLogOutput)
|
|
{
|
|
prefix+=RemoteLogColor.name();
|
|
prefix+="\">";
|
|
}
|
|
prefix+=i18n("remote")+": ";
|
|
|
|
break;
|
|
case error:
|
|
if (useColorizedLogOutput)
|
|
{
|
|
prefix+=ErrorLogColor.name();
|
|
prefix+="\">";
|
|
}
|
|
prefix+=i18n("error")+": ";
|
|
|
|
break;
|
|
case success:
|
|
if (useColorizedLogOutput)
|
|
{
|
|
prefix+=SuccessLogColor.name();
|
|
prefix+="\">";
|
|
}
|
|
prefix+=i18n("success")+": ";
|
|
break;
|
|
case debug:
|
|
if (useColorizedLogOutput)
|
|
{
|
|
prefix+=DebugLogColor.name();
|
|
prefix+="\">";
|
|
}
|
|
prefix+=i18n("debug")+": ";
|
|
break;
|
|
}
|
|
|
|
if (useColorizedLogOutput)
|
|
postfix+="</font>";
|
|
|
|
LogOutput->append( prefix+msg+postfix );
|
|
// if (appPointer->hasPendingEvents ())
|
|
// appPointer->processEvents();
|
|
}
|
|
|
|
void KVpncConfig::slotStatusMsg( const TQString &text, int id )
|
|
{
|
|
if ( id != ID_FLASH_MSG )
|
|
{
|
|
statusbar ->clear();
|
|
statusbar ->changeItem( text, id );
|
|
}
|
|
else
|
|
{
|
|
statusbar->message( text, 2000 );
|
|
}
|
|
|
|
}
|
|
|
|
void KVpncConfig::saveOptions(bool saveOneProfile, TQString Profile)
|
|
{
|
|
if (saveOneProfile && Profile.isEmpty())
|
|
return;
|
|
TDEStandardDirs * dirs = TDEGlobal::dirs();
|
|
TQString filePath = dirs->findResource ( "config", "kvpncrc" );
|
|
TQFile::remove
|
|
( filePath );
|
|
|
|
config->setGroup( "Notification Messages" );
|
|
config->writeEntry( "hideOnCloseInfo" ,hideOnCloseInfo);
|
|
|
|
if (!saveOneProfile)
|
|
{
|
|
|
|
config->setGroup( "General Options" );
|
|
|
|
checkStandardPathValues();
|
|
|
|
config->writeEntry( "Minimize after connect", minimizeAfterConnect );
|
|
config->writeEntry("Hide on startup", hideMainWindow );
|
|
config->writeEntry( "Use silent quit", useSilentQuit );
|
|
config->writeEntry( "Dont quit on CloseEvent", dontQuitOnCloseEvent );
|
|
config->writeEntry( "Enable pppd debug", enableDebugPppd );
|
|
config->writeEntry( "Enable pptpd debug", enableDebugPptpd );
|
|
config->writeEntry( "Enable l2tpd debug", enableDebugL2tpd );
|
|
config->writeEntry( "Enable xl2tpd debug", enableDebugXl2tpd );
|
|
config->writeEntry( "Enable openl2tp debug", enableDebugOpenl2tp );
|
|
config->writeEntry( "Enable FreeSWAN verbose", enableFreeswanVerbose );
|
|
config->writeEntry( "Pluto Debug", PlutoDebug.join(" "));
|
|
config->writeEntry( "Klips Debug", KlipsDebug.join(" "));
|
|
config->writeEntry( "Show debugconsole", showDebugConsole );
|
|
config->writeEntry( "Pid file for vpnc ", Vpnc_pid_file );
|
|
config->writeEntry( "Vpnc debuglevel", VpncDebugLevel );
|
|
config->writeEntry( "Racoon debuglevel", RacoonDebugLevel );
|
|
config->writeEntry( "Kvpnc debuglevel", KvpncDebugLevel );
|
|
config->writeEntry( "Pppd debuglevel", PppdDebugLevel );
|
|
config->writeEntry( "Openvpn debuglevel", OpenvpnDebugLevel );
|
|
config->writeEntry( "Pptp debuglevel", PptpLogLevel );
|
|
config->writeEntry( "Ssh debuglevel", SshDebugLevel );
|
|
config->writeEntry( "Pppd kernel log level", PppdKernelLogLevel );
|
|
config->writeEntry( "Path to vpnc-bin", pathToVpnc );
|
|
config->writeEntry( "Path to vpnclient", pathToCiscoVpnc );
|
|
config->writeEntry( "Path to racoon", pathToRacoon );
|
|
config->writeEntry( "Path to racoonctl", pathToRacoonctl );
|
|
config->writeEntry( "Path to setkey", pathToSetkey );
|
|
config->writeEntry( "Path to iptables", pathToIptables );
|
|
config->writeEntry( "Path to openssl", pathToOpenssl );
|
|
config->writeEntry( "Path to freeswan", pathToIpsec );
|
|
config->writeEntry( "Path to pppd", pathToPppd );
|
|
config->writeEntry( "Path to pptp", pathToPptp );
|
|
config->writeEntry( "Path to l2tpd", pathToL2tpd );
|
|
config->writeEntry( "Path to xl2tpd", pathToXl2tpd );
|
|
config->writeEntry( "Path to openl2tp", pathToOpenl2tp );
|
|
config->writeEntry( "Path to kill", pathToKill );
|
|
config->writeEntry( "Path to kill-all", pathToKillall );
|
|
config->writeEntry( "Path to ping", pathToPing );
|
|
config->writeEntry( "Path to openvpn", pathToOpenvpn );
|
|
config->writeEntry( "Path to iputility", pathToIp );
|
|
config->writeEntry( "Path to ifconfig", pathToIfconfig );
|
|
config->writeEntry( "Path to route", pathToRoute );
|
|
config->writeEntry( "Path to netstat", pathToNetstat );
|
|
config->writeEntry( "Path to pkcs11-tool", pathToPkcs11Tool );
|
|
config->writeEntry( "Path to vtund", pathToVtund );
|
|
config->writeEntry( "Path to cisco_cert_mgr",pathToCiscoCertMgr);
|
|
config->writeEntry( "Path to tail",pathToTail);
|
|
config->writeEntry( "Path to ssh",pathToSsh);
|
|
config->writeEntry( "Path to ksshaskpass",pathToKsshAskpass);
|
|
config->writeEntry( "Path to ssh-askpass-gnome",pathToGnomeSshAskpass);
|
|
config->writeEntry( "Show Statusbar", showStatusBar );
|
|
config->writeEntry( "Try connect timeout", tryConnectTimeout );
|
|
config->writeEntry( "Last Profile", lastProfile );
|
|
config->writeEntry( "Write log file", writeLogFile );
|
|
config->writeEntry( "Hold generated scripts", holdGeneratedScripts );
|
|
config->writeEntry( "Programs in path", programsInPath );
|
|
config->writeEntry( "Info logwindow color", InfoLogColor );
|
|
config->writeEntry( "Remote logwindow color", RemoteLogColor );
|
|
config->writeEntry( "Error logwindow color", ErrorLogColor );
|
|
config->writeEntry( "Success logwindow color", SuccessLogColor );
|
|
config->writeEntry( "Debug logwindow color", DebugLogColor );
|
|
config->writeEntry("Debug background color", DebugBackgroundcolor );
|
|
config->writeEntry( "Use colorized log output", useColorizedLogOutput );
|
|
config->writeEntry( "Show interface IP in tooltip", showInterfaceIPinTooltip );
|
|
config->writeEntry( "Auto connect profile", AutoConnectProfile );
|
|
config->writeEntry( "Do auto connect at startup", doAutoConnectAtStartup );
|
|
config->writeEntry( "Log viewer font size", LogViewerFontSize );
|
|
config->writeEntry( "Mainwindow width", parent->width() );
|
|
config->writeEntry( "Mainwindow height", parent->height() );
|
|
config->writeEntry( "Mainwindow position x", parent->x() );
|
|
config->writeEntry( "Mainwindow position y", parent->y() );
|
|
config->writeEntry("Openvpn management port", OpenvpnManagementPort );
|
|
//config->writeEntry( "ToolBar Settings" ,parent->toolBar( "mainToolBar" ));
|
|
config->writeEntry("Use TDEWallet",useTDEwallet);
|
|
config->writeEntry("FeedbackMailSent",feedbackMailSent);
|
|
config->writeEntry("Do kill l2tpd if still running",doKillL2tpdIfStillRunning);
|
|
config->writeEntry("Do kill racoon if still running",doKillRacoonIfStillRunning);
|
|
config->writeEntry("Do kill xl2tpd if still running",doKillXl2tpdIfStillRunning);
|
|
config->writeEntry("Show connection time in Tooltip",showConnectionTimeInTooltip);
|
|
config->writeEntry("Enable debug Openvpn",enableDebugOpenvpn);
|
|
|
|
config->writeEntry("EnableDebugXl2tpdNetwork",enableDebugXl2tpdNetwork);
|
|
config->writeEntry("EnableDebugXl2tpdpacket",enableDebugXl2tpdpacket);
|
|
config->writeEntry("EnableDebugXl2tpdstate",enableDebugXl2tpdstate);
|
|
config->writeEntry("EnableDebugXl2tpdtunnel",enableDebugXl2tpdtunnel);
|
|
|
|
//appPointer->processEvents();
|
|
}
|
|
|
|
if (useTDEwallet && TDEWallet::Wallet::isEnabled())
|
|
config->writeEntry( "First use of TDEwallet", false );
|
|
/* = user data = */
|
|
VpnAccountData *it;
|
|
if ( !AccountList->isEmpty() )
|
|
{
|
|
/* passwords with tdewallet */
|
|
if ( useTDEwallet && TDEWallet::Wallet::isEnabled())
|
|
{
|
|
if (!skipTDEwalletStoring )
|
|
{
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n( "Wallet enabled and available, writing to wallet." ),debug);
|
|
// Open local wallet
|
|
wallet = TDEWallet::Wallet::openWallet(TDEWallet::Wallet::LocalWallet());
|
|
//appPointer->processEvents();
|
|
if (wallet != 0)
|
|
{
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n( "Wallet disabled or not available, writing to config file." ),debug);
|
|
}
|
|
|
|
TQPtrList<VpnAccountData> *TmpAccountList;
|
|
|
|
if (!saveOneProfile)
|
|
TmpAccountList = AccountList;
|
|
else
|
|
{
|
|
TmpAccountList = new TQPtrList<VpnAccountData>();
|
|
TmpAccountList->setAutoDelete( TRUE ); // the list owns the objects
|
|
VpnAccountData *ProfileData;
|
|
|
|
for ( ProfileData = AccountList->first(); it; it = AccountList->next() )
|
|
{
|
|
if ( ProfileData->getName() == Profile )
|
|
{
|
|
TmpAccountList->append(ProfileData);
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
for ( it = TmpAccountList->first(); it; it = TmpAccountList->next() )
|
|
{
|
|
// appPointer->processEvents();
|
|
// std::cout << "Save profile: " << it->getName().ascii() << std::endl;
|
|
|
|
if ( !it->getName().isEmpty() )
|
|
{
|
|
TQString name = it->getName();
|
|
TQString ProfileName = "Profile_";
|
|
ProfileName += name;
|
|
config->setGroup( ProfileName );
|
|
|
|
config->writeEntry("Description",it->getDescription());
|
|
|
|
/* passwords with tdewallet */
|
|
if ( useTDEwallet && TDEWallet::Wallet::isEnabled())
|
|
{
|
|
if (!skipTDEwalletStoring )
|
|
{
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n( "Wallet enabled and available, writing to wallet." ),debug);
|
|
if (wallet != 0)
|
|
{
|
|
TQString walletname="kvpnc";
|
|
// Check if folder exists, otherwise create it
|
|
bool walletOK=true;
|
|
if (!wallet->hasFolder(walletname))
|
|
{
|
|
walletOK = wallet->createFolder(walletname);
|
|
// wallet->sync();
|
|
// appPointer->processEvents();
|
|
}
|
|
if (walletOK)
|
|
{
|
|
wallet->setFolder(walletname);
|
|
// appPointer->processEvents();
|
|
//std::cout << "[set] account: " << ProfileName << ", loginname: " << loginname << ", password: " << pwd << std::endl;
|
|
bool UserPasswordOK=true;
|
|
if ( it->getSaveUserPassword() )
|
|
UserPasswordOK = (wallet->writePassword (TQString(name+"__user_pw"), it->getUserPassword()) == 0);
|
|
else
|
|
UserPasswordOK = (wallet->writePassword (TQString(name+"__user_pw"), "") == 0);
|
|
// wallet->sync();
|
|
// appPointer->processEvents();
|
|
|
|
bool PskOK=true;
|
|
if ( it->getSavePsk() )
|
|
PskOK = (wallet->writePassword (TQString(name+"__psk"), it->getPreSharedKey()) == 0);
|
|
else
|
|
PskOK = (wallet->writePassword (TQString(name+"__psk"), "") == 0);
|
|
// wallet->sync();
|
|
|
|
// appPointer->processEvents();
|
|
|
|
bool PskKeyPassOK = (wallet->writePassword (TQString(name+"__priv_key_pwd"), it->getPrivateKeyPass()) == 0);
|
|
// // wallet->sync();
|
|
|
|
// appPointer->processEvents();
|
|
|
|
if (KvpncDebugLevel > 2)
|
|
{
|
|
if (UserPasswordOK)
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n( "write of %1 was ok." ).arg(i18n("user password")), debug);
|
|
else
|
|
{
|
|
// if ( KMessageBox::warningContinueCancel( 0,
|
|
// i18n( "KVpnc is unable to save %1 password securely in your wallet.<br>"
|
|
// "Do you want to save the password in the <b>unsafe</b> configuration file instead?" ).arg(i18n("user password")),
|
|
// i18n( "Unable to store secure %1" ).arg(i18n("user password")),
|
|
// KGuiItem( i18n( "Store &Unsafe" ), TQString::fromLatin1( "unlock" ),TQString::fromLatin1( "TDEWalletFallbackToTDEConfig" ) ) ) == KMessageBox::Continue )
|
|
// {
|
|
// config->writeEntry( "User password", it->getUserPassword() );
|
|
// }
|
|
|
|
appendLogEntry(i18n( "write of %1 has failed." ).arg(i18n("user password")), error);
|
|
}
|
|
|
|
if (PskOK)
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n( "write of %1 was successful." ).arg(i18n("preshared key")), debug);
|
|
else
|
|
{
|
|
// if ( KMessageBox::warningContinueCancel( 0,
|
|
// i18n( "KVpnc is unable to save %1 password securely in your wallet.<br>"
|
|
// "Do you want to save the password in the <b>unsafe</b> configuration file instead?" ).arg(i18n("pre shared key")),
|
|
// i18n( "Unable to store secure %1" ).arg(i18n("pre shared key")),
|
|
// KGuiItem( i18n( "Store &Unsafe" ), TQString::fromLatin1( "unlock" ),TQString::fromLatin1( "TDEWalletFallbackToTDEConfig" ) ) ) == KMessageBox::Continue )
|
|
// {
|
|
// config->writeEntry( "Pre shared key", it->getPreSharedKey() );
|
|
// }
|
|
appendLogEntry(i18n( "write of %1 has failed." ).arg(i18n("preshared key")),error);
|
|
}
|
|
|
|
if (PskOK)
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n( "write of %1 was successful." ).arg(i18n("preshared key")), debug);
|
|
else
|
|
{
|
|
// if ( KMessageBox::warningContinueCancel( 0,
|
|
// i18n( "KVpnc is unable to save %1 password securely in your wallet.<br>"
|
|
// "Do you want to save the password in the <b>unsafe</b> configuration file instead?" ).arg(i18n("preshared key password")),
|
|
// i18n( "Unable to store secure %1" ).arg(i18n("reshared key password")),
|
|
// KGuiItem( i18n( "Store &Unsafe" ), TQString::fromLatin1( "unlock" ),TQString::fromLatin1( "TDEWalletFallbackToTDEConfig" ) ) ) == KMessageBox::Continue )
|
|
// {
|
|
// config->writeEntry( "Pre shared key", it->getPreSharedKey() );
|
|
// }
|
|
appendLogEntry(i18n( "write of %1 has failed." ).arg(i18n("preshared key")),error);
|
|
}
|
|
if (PskKeyPassOK)
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n( "write of %1 was successful." ).arg(i18n("preshared key password")), debug);
|
|
else
|
|
{
|
|
// if ( KMessageBox::warningContinueCancel( 0,
|
|
// i18n( "KVpnc is unable to save %1 password securely in your wallet.<br>"
|
|
// "Do you want to save the password in the <b>unsafe</b> configuration file instead?" ).arg(i18n("preshared key password")),
|
|
// i18n( "Unable to store secure %1" ).arg(i18n("reshared key password")),
|
|
// KGuiItem( i18n( "Store &Unsafe" ), TQString::fromLatin1( "unlock" ),TQString::fromLatin1( "TDEWalletFallbackToTDEConfig" ) ) ) == KMessageBox::Continue )
|
|
// {
|
|
// config->writeEntry( "Pre shared key", it->getPreSharedKey() );
|
|
// }
|
|
appendLogEntry(i18n( "write of %1 has failed." ).arg(i18n("preshared key password")),error);
|
|
}
|
|
//std::cout << "success: " << pwdOK << std::endl;
|
|
}
|
|
// appPointer->processEvents();
|
|
// wallet->sync();
|
|
}
|
|
else
|
|
{
|
|
KMessageBox::error( 0, i18n( "Unable to create wallet folder for kvpnc!" ) );
|
|
appendLogEntry(i18n( "Unable to create wallet folder for kvpnc!" ), error);
|
|
}
|
|
}
|
|
}
|
|
else //sessionSaving neither writing to wallet nor to config-file
|
|
{
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n( "Writing into Wallet is not possible at shutdown, skipping." ),debug);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//Wallet not available
|
|
//if (!useTDEwallet)
|
|
{
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n( "Wallet disabled or not available, writing to config file." ),debug);
|
|
// write passwords to config file :|
|
|
if ( it->getSaveUserPassword() )
|
|
{
|
|
config->writeEntry( "User password", it->getUserPassword() );
|
|
}
|
|
if ( it->getSavePsk() )
|
|
{
|
|
config->writeEntry( "Pre shared key", it->getPreSharedKey() );
|
|
}
|
|
config->writeEntry( "PrivateKey password", it->getPrivateKeyPass() );
|
|
}
|
|
}
|
|
|
|
// appPointer->processEvents();
|
|
|
|
// KMessageBox::information(0,"connection type changed: "+TQString().setNum(it->getConnectionType())+TQString(" ")+it->getName(),TQString("type set"));
|
|
|
|
// normal config
|
|
if ( it->getConnectionType() == VpnAccountData::cisco )
|
|
config->writeEntry( "Connection type", "cisco" );
|
|
else if ( it->getConnectionType() == VpnAccountData::ciscoorig )
|
|
config->writeEntry( "Connection type", "ciscoorig" );
|
|
else if ( it->getConnectionType() == VpnAccountData::racoon )
|
|
config->writeEntry( "Connection type", "racoon" );
|
|
else if ( it->getConnectionType() == VpnAccountData::l2tpd_racoon )
|
|
config->writeEntry( "Connection type", "l2tpd (racoon)" );
|
|
else if ( it->getConnectionType() == VpnAccountData::freeswan )
|
|
config->writeEntry( "Connection type", "freeswan" );
|
|
else if ( it->getConnectionType() == VpnAccountData::l2tpd_freeswan )
|
|
config->writeEntry( "Connection type", "l2tpd (openswan)" );
|
|
else if ( it->getConnectionType() == VpnAccountData::pptp )
|
|
config->writeEntry( "Connection type", "pptp" );
|
|
else if ( it->getConnectionType() == VpnAccountData::openvpn )
|
|
config->writeEntry( "Connection type", "openvpn" );
|
|
else if ( it->getConnectionType() == VpnAccountData::vtun )
|
|
config->writeEntry( "Connection type", "vtun" );
|
|
else if ( it->getConnectionType() == VpnAccountData::ssh )
|
|
config->writeEntry( "Connection type", "ssh" );
|
|
else
|
|
config->writeEntry( "Connection type", "other" );
|
|
config->writeEntry( "VPN Gateway", it->getGateway() );
|
|
config->writeEntry( "VPN ID", it->getID() );
|
|
config->writeEntry( "Username", it->getUserName() );
|
|
|
|
config->writeEntry( "Save user password", it->getSaveUserPassword() );
|
|
config->writeEntry( "Save PSK", it->getSavePsk() );
|
|
config->writeEntry( "Save private key password", it->getSavePrivateKeyPassword() );
|
|
config->writeEntry( "Private key", it->getPrivateKey() );
|
|
config->writeEntry( "Use advanced settings", it->getUseAdvancedSettings() );
|
|
config->writeEntry( "Application version", it->getApplicationVersion() );
|
|
config->writeEntry( "Local port", it->getLocalPort() );
|
|
config->writeEntry( "Remote port", it->getRemotePort() );
|
|
config->writeEntry( "NT domain name", it->getNtDomainName() );
|
|
config->writeEntry( "Perfect forward secrety", it->getPerfectForwardSecrety() );
|
|
config->writeEntry( "IKE group", it->getIkeGroup() );
|
|
|
|
config->writeEntry( "Use application version", it->getUseApplicationVersion() );
|
|
config->writeEntry( "Use global IPSec secret", it->getUseGlobalIpsecSecret() );
|
|
config->writeEntry( "Use IKE group", it->getUseIkeGroup() );
|
|
config->writeEntry( "Use local port", it->getUseLocalPort() );
|
|
config->writeEntry( "Use remote port", it->getUseRemotePort() );
|
|
config->writeEntry( "Use NT domain name", it->getUseNtDomainName() );
|
|
config->writeEntry( "Use single DES", it->getUseSingleDes() );
|
|
config->writeEntry( "Use perfect Forward Secrety", it->getUsePerfectForwardSecrety() );
|
|
config->writeEntry( "Remote net address", it->getRemoteNetAddr() );
|
|
config->writeEntry( "Remote net mask", it->getRemoteNetMask() );
|
|
|
|
config->writeEntry( "x509 certificate", it->getX509Certificate() );
|
|
config->writeEntry( "Ca certificate", it->getCaCertificate() );
|
|
config->writeEntry( "Network device", it->getNetworkDevice() );
|
|
config->writeEntry( "Cert path", it->getCertPath() );
|
|
|
|
// // fix bad type
|
|
// if ((it->getConnectionType() == VpnAccountData::pptp || it->getConnectionType() == VpnAccountData::openvpn || it->getConnectionType() == VpnAccountData::racoon || it->getConnectionType() == VpnAccountData::l2tpd_racoon || it->getConnectionType() == VpnAccountData::freeswan || it->getConnectionType() == VpnAccountData::l2tpd_freeswan || it->getConnectionType() == VpnAccountData::vtun) && ( it->getAuthType() != "cert" || it->getAuthType() != "psk"))
|
|
// {
|
|
// it->setAuthType( VpnAccountData::cert);
|
|
// }
|
|
|
|
if ( it->getAuthType() == VpnAccountData::cert )
|
|
config->writeEntry( "Auth type", "cert" );
|
|
else if ( it->getAuthType() == VpnAccountData::psk )
|
|
config->writeEntry( "Auth type", "psk" );
|
|
else if ( it->getAuthType() == VpnAccountData::hybrid )
|
|
config->writeEntry( "Auth type", "hybrid" );
|
|
else
|
|
config->writeEntry( "Auth type", "unknownauth" );
|
|
|
|
config->writeEntry( "do ping ip", it->getDoPingIP() );
|
|
config->writeEntry( "Ping host IP", it->getPingHostIP() );
|
|
|
|
// appPointer->processEvents();
|
|
|
|
config->writeEntry( "Use special remote ID", it->getUseSpecialRemoteID() );
|
|
config->writeEntry( "Use special local ID", it->getUseSpecialLocalID() );
|
|
config->writeEntry( "Special server certificate", it->getSpecialServerCertificate() );
|
|
config->writeEntry( "Use special server certificate", it->getUseSpecialServerCertificate() );
|
|
config->writeEntry( "Special remote ID", it->getSpecialRemoteID() );
|
|
config->writeEntry( "Special local ID", it->getSpecialLocalID() );
|
|
config->writeEntry( "Local ID type", it->getLocalIDType() );
|
|
config->writeEntry( "Remote ID type", it->getRemoteIDType() );
|
|
config->writeEntry( "Use UDP-protocol", it->getUseUdp() );
|
|
config->writeEntry( "Use UDP-port", it->getUseUdpPort() );
|
|
config->writeEntry( "local UDP port", it->getUdpPort() );
|
|
config->writeEntry( "use DNS_UPDATE", it->getUseDnsUpdate() );
|
|
config->writeEntry( "use DNS-server", it->getUseDnsServer() );
|
|
config->writeEntry( "DNS server", it->getDnsServer() );
|
|
config->writeEntry( "refuse 40 bit encryption", it->getRefuse40BitEncryption() );
|
|
config->writeEntry( "refuse 128 bit encryption", it->getRefuse128BitEncryption() );
|
|
config->writeEntry( "require stateless encryption", it->getAllowStatefulMode() );
|
|
config->writeEntry( "require mppe", it->getRequireMppe() );
|
|
config->writeEntry( "Disable MPPE compression", it->getDisableMPPEComp() );
|
|
config->writeEntry( "Local virtual IP", it->getLocalVirtualIP() );
|
|
config->writeEntry( "Remote virtual IP", it->getRemoteVirtualIP() );
|
|
config->writeEntry( "Pre shared key file", it->getPreSharedKeyFile() );
|
|
config->writeEntry( "Execute command before connect", it->getExecuteCmdBeforeConnect() );
|
|
config->writeEntry( "Execute command after connect", it->getExecuteCmdAfterConnect() );
|
|
config->writeEntry( "Execute command before disconnect", it->getExecuteCmdBeforeDisconnect() );
|
|
config->writeEntry( "Execute command after disconnect", it->getExecuteCmdAfterDisconnect() );
|
|
config->writeEntry( "Command before connect", it->getCommandBeforeConnect() );
|
|
config->writeEntry( "Command after connect", it->getCommandAfterConnect() );
|
|
config->writeEntry( "Command before disconnect", it->getCommandBeforeDisconnect() );
|
|
config->writeEntry( "Command after disconnect", it->getCommandAfterDisconnect() );
|
|
config->writeEntry( "Use no BSD compression", it->getUseNoBsdComp() );
|
|
config->writeEntry( "Do not use no IP by default", it->getUseNoIpDefault());
|
|
config->writeEntry( "Use no deflate", it->getUseNoDeflate() );
|
|
config->writeEntry( "Replace default route", it->getReplaceDefaultRoute() );
|
|
config->writeEntry( "Use own MTU", it->getUseMtu() );
|
|
config->writeEntry( "Use own MRU", it->getUseMru() );
|
|
config->writeEntry( "MTU for pppd", it->getMtu() );
|
|
config->writeEntry( "MRU for pppd", it->getMru() );
|
|
config->writeEntry( "Use virtual IP", it->getUseVirtualIP() );
|
|
config->writeEntry( "Virtual IP", it->getVirtualIP() );
|
|
config->writeEntry( "PSK is in file", it->getPskIsInFile() );
|
|
config->writeEntry( "Use additional network routes", it->getUseAdditionalNetworkRoutes() );
|
|
config->writeEntry( "Hash algorithm", it->getHashAlgo() );
|
|
config->writeEntry( "Encryption algorithm", it->getEncryptionAlgorithm() );
|
|
config->writeEntry( "Authentication algorithm", it->getAuthenticationAlgorithm() );
|
|
config->writeEntry( "Tunnel device type", it->getTunnelDeviceType() );
|
|
config->writeEntry( "Use userdefined port", it->getUseUserdefinedPort() );
|
|
config->writeEntry( "Userdefined port", it->getUserdefinedPort() );
|
|
config->writeEntry( "NS cert type", it->getNsCertType() );
|
|
config->writeEntry( "Use NS cert type", it->getUseNsCertType() );
|
|
config->writeEntry( "Use connection status check", it->getUseConnectionStatusCheck() );
|
|
config->writeEntry( "Connection check success count", it->getConnectionStatusCheckSuccessCount() );
|
|
config->writeEntry( "Connection check status interval", it->getConnectionStatusInterval() );
|
|
config->writeEntry( "Do reconnect after connection lost", it->getDoReconnectAfterConnectionLost());
|
|
config->writeEntry( "Disable LZO compression", it->getDisableLzoCompression());
|
|
config->writeEntry( "AuthWithUsernameAndPassword", it->getAuthWithUsernameAndPassword() );
|
|
config->writeEntry( "AllowEmptyGroupPassword", it->getAllowEmptyGroupPassword() );
|
|
config->writeEntry( "Use userdefinied cipher", it->getUseUserdefiniedCipher() );
|
|
config->writeEntry( "Userdefinied cipher", it->getUserdefiniedCipher() );
|
|
config->writeEntry( "Use redirect gateway", it->getUseRedirectGateway() );
|
|
// appPointer->processEvents();
|
|
config->writeEntry( "Use TLS auth", it->getUseTlsAuth() );
|
|
config->writeEntry( "TLS auth file", it->getTlsAuthFile() );
|
|
config->writeEntry( "Use HTTP proxy", it->getUseHttpProxy() );
|
|
config->writeEntry( "HTTP proxy host", it->getHttpProxy() );
|
|
config->writeEntry( "HTTP proxy port", it->getHttpProxyPort() );
|
|
config->writeEntry( "HTTP proxy timeout", it->getHttpProxyTimeout() );
|
|
config->writeEntry( "Dont save username", it->getDontSaveUsername() );
|
|
config->writeEntry( "Use mode config", it->getUseModeConfig() );
|
|
config->writeEntry( "Exchange mode", it->getExchangeMode() );
|
|
config->writeEntry( "Use delay at reconnect", it->getUseReconnectDelay() );
|
|
config->writeEntry( "Reconnect delay", it->getReconnectDelay() );
|
|
config->writeEntry( "Use TLS host", it->getUseTlsRemoteHost() );
|
|
config->writeEntry( "TLS remote host", it->getTlsRemoteHost() );
|
|
config->writeEntry( "Disable opportunistic encryption", it->getDisableOpportunisticEncryption() );
|
|
config->writeEntry( "Right next hop", it->getRightNextHop() );
|
|
config->writeEntry( "Left next hop", it->getLeftNextHop() );
|
|
config->writeEntry( "Use userdefinied packet size for fragmentation", it->getUseFragment() );
|
|
config->writeEntry( "Use userdef packet size", it->getUseMssfix() );
|
|
config->writeEntry( "Fragment", it->getFragment() );
|
|
config->writeEntry( "PeerTimeout", it->getPeerTimeout() );
|
|
config->writeEntry("Disable CCP", it->getDisableCcp() );
|
|
config->writeEntry("Use smartcard", it->getUseSmartcard() );
|
|
config->writeEntry("Use Xauth interactive", it->getUseXauthInteractive() );
|
|
config->writeEntry("Use HTTP Proxy Authentication", it->getUseHttpProxyAuth() );
|
|
config->writeEntry("HTTP Proxy Authtype", it->getHttpProxyAuthType() );
|
|
config->writeEntry("Use HTTP Proxy Auth user", it->getHttpProxyUser() );
|
|
config->writeEntry("Use HTTP Proxy Auth pass", it->getHttpProxyPass() );
|
|
config->writeEntry("Use only CA cert and user auth", it->getUseOnlyCaCertAndUserAuth() );
|
|
config->writeEntry("Use mail address as identifier", it->getUseMailAddressAsIdentifier() );
|
|
config->writeEntry("Use right next hop", it->getUseRightNextHop() );
|
|
config->writeEntry("Use left next hop", it->getUseLeftNextHop() );
|
|
config->writeEntry("Pkcs11 providers", it->getPkcs11Providers() );
|
|
config->writeEntry("Pkcs11 slot type", it->getPkcs11SlotType() );
|
|
config->writeEntry("Pkcs11 slot", it->getPkcs11Slot() );
|
|
config->writeEntry("Pkcs11 id type", it->getPkcs11IdType() );
|
|
config->writeEntry("Pkcs11 id", it->getPkcs11Id() );
|
|
config->writeEntry("Pkcs11 sign mode", it->getPkcs11SignMode() );
|
|
config->writeEntry("Use Pkcs11 providers", it->getUsePkcs11Providers() );
|
|
config->writeEntry("Allow empty private key password", it->getAllowEmptyPrivateKeyPassword());
|
|
config->writeEntry("Allow ip address change of peer", it->getAllowIpAddressChangeOfPeer());
|
|
config->writeEntry("Auth method", it->getAuthMethod());
|
|
config->writeEntry("Command after connect delay time", it->getCommandAfterConnectDelayTime());
|
|
config->writeEntry("Use search domain in resolv conf",it->getUseSearchDomainInResolvConf());
|
|
config->writeEntry("Use domain in resolv conf",it->getUseDomainInResolvConf());
|
|
config->writeEntry("Search domain in resolv conf",it->getSearchDomainInResolvConf());
|
|
config->writeEntry("Domain in resolv conf",it->getDomainInResolvConf());
|
|
config->writeEntry("Authentication direction",it->getAuthenticationDirection());
|
|
config->writeEntry("CiscoNatMode", it->getCiscoNatMode());
|
|
config->writeEntry("IPSec ESP",it->getIpsecEsp());
|
|
config->writeEntry("IPSec IKE",it->getIpsecIke());
|
|
config->writeEntry("Vtun profile",it->getVtunProfile());
|
|
config->writeEntry("Disable data encryption", it->getDisableDataEncryption());
|
|
config->writeEntry("Use authentication algorithm", it->getUseAuthenticationAlgorithm());
|
|
config->writeEntry("Fix path mtu discovery problem" , it ->getFixPathMtuDiscoveryProblem());
|
|
config->writeEntry("Use remote network", it->getUseRemoteNetwork());
|
|
config->writeEntry("Ipsec vpn mode", it->getIpsecVpnMode());
|
|
config->writeEntry("DisableHeaderCompression",it->getDisableHeaderCompression());
|
|
config->writeEntry("DisableMagicNumberNegotiation",it->getDisableMagicNumberNegotiation());
|
|
config->writeEntry("DisableIpx",it->getDisableIpx());
|
|
config->writeEntry("Disable protocol field compression",it->getDisableProtocolFieldCompression());
|
|
config->writeEntry("Disable adress control compression",it->getDisableAdressControlCompression());
|
|
config->writeEntry("Use custom ike",it->getUseCustomIke());
|
|
config->writeEntry("Use custom esp",it->getUseCustomEsp());
|
|
config->writeEntry("Verify ca cert",it->getVerifyCaCert());
|
|
config->writeEntry("Use DPD idle timeout",it->getUseDpdIdleTimeout());
|
|
config->writeEntry("DPD idle timeout",it->getDpdIdleTimeout());
|
|
config->writeEntry("Hide group password in accountdata dialog",it->getHideGroupPasswordInAccountDataDialog());
|
|
config->writeEntry("MaxConnectTries",it->getMaxConnectTries());
|
|
config->writeEntry("L2tpDaemon",it->getL2tpDaemon());
|
|
config->writeEntry("UseLeftSourceIp",it->getUseLeftSourceIp());
|
|
config->writeEntry("UseRightSourceIp",it->getUseRightSourceIp());
|
|
config->writeEntry("LeftSourceIp",it->getLeftSourceIp());
|
|
config->writeEntry("RightSourceIp",it->getRightSourceIp());
|
|
config->writeEntry("Use virtual subnets",it->getUseVirtualSubnetworks());
|
|
config->writeEntry("Virtual subnets", it->getVirtualSubnetworks());
|
|
config->writeEntry("DisablePushFromServer", it->getDisablePushFromServer());
|
|
config->writeEntry("DisableBind", it->getDisableBind());
|
|
config->writeEntry("UseRenegSec", it->getUseRenegSec());
|
|
config->writeEntry("RenegSec", it->getRenegSec());
|
|
config->writeEntry("UseTunnelPing", it->getUseTunnelPing());
|
|
config->writeEntry("TunnelPing", it->getTunnelPing());
|
|
config->writeEntry("UseTunnelPingRestart", it->getUseTunnelPingRestart());
|
|
config->writeEntry("TunnelPingRestart", it->getTunnelPingRestart());
|
|
config->writeEntry("RequireEap", it->getRequireEap());
|
|
config->writeEntry("UseSshConfigRemoteScript", it->getUseSshConfigRemoteScript());
|
|
config->writeEntry("SshConfigRemoteScript", it->getSshConfigRemoteScript());
|
|
config->writeEntry("AskUserPasswordOnEachConnect", it->getAskUserPasswordOnEachConnect());
|
|
config->writeEntry("UseCiscoCertStore", it->getUseCiscoCertStore());
|
|
config->writeEntry("UseNat", it->getUseNat());
|
|
|
|
// appPointer->processEvents();
|
|
|
|
TQString AdditionalNetworkRoutesString;
|
|
TQStringList AdditionalNetworkRoutes = it->getAdditionalNetworkRoutes();
|
|
|
|
// Networks delimited by a ','
|
|
for ( TQStringList::Iterator it2 = AdditionalNetworkRoutes.begin(); it2 != AdditionalNetworkRoutes.end(); ++it2 )
|
|
{
|
|
AdditionalNetworkRoutesString+=*it2;
|
|
AdditionalNetworkRoutesString+=",";
|
|
}
|
|
AdditionalNetworkRoutesString=AdditionalNetworkRoutesString.left(AdditionalNetworkRoutesString.length()-1);
|
|
config->writeEntry( "Additional network routes", AdditionalNetworkRoutesString );
|
|
|
|
// wallet->sync();
|
|
/* give info */
|
|
// slotStatusMsg ( i18n( "Profile \"%1\" saved." ).arg( ProfileName.remove("Profile_") ), ID_FLASH_MSG );
|
|
|
|
appendLogEntry ( i18n( "Profile \"%1\" saved." ).arg( ProfileName.remove("Profile_") ) , info);
|
|
// appPointer->processEvents();
|
|
}
|
|
appPointer->processEvents();
|
|
}
|
|
}
|
|
|
|
|
|
// if ( !skipTDEwalletStoring && wallet != 0)
|
|
// if (useTDEwallet && TDEWallet::Wallet::isEnabled())
|
|
// if (wallet->isOpen())
|
|
// wallet->sync();
|
|
config->sync();
|
|
doBackupConfig();
|
|
|
|
slotStatusMsg ( i18n( "Profiles saved." ) , ID_FLASH_MSG );
|
|
appPointer->processEvents();
|
|
}
|
|
|
|
void KVpncConfig::loadOptions()
|
|
{
|
|
config->setGroup( "Notification Messages" );
|
|
hideOnCloseInfo = config->readBoolEntry( "hideOnCloseInfo" ,false);
|
|
|
|
config->setGroup( "General Options" );
|
|
minimizeAfterConnect = config->readBoolEntry( "Minimize after connect", true );
|
|
hideMainWindow = config->readBoolEntry("Hide on startup", false );
|
|
useSilentQuit = config->readBoolEntry( "Use silent quit", false );
|
|
dontQuitOnCloseEvent = config->readBoolEntry( "Dont quit on CloseEvent", true );
|
|
showDebugConsole = config->readBoolEntry( "Show debugconsole", true );
|
|
enableDebugPppd = config->readBoolEntry( "Enable pppd debug", false );
|
|
enableDebugPptpd = config->readBoolEntry( "Enable pptpd debug", false );
|
|
enableFreeswanVerbose = config->readBoolEntry( "Enable FreeSWAN verbose", false );
|
|
PlutoDebug = TQStringList::split(" ", config->readEntry( "Pluto Debug", ""));
|
|
KlipsDebug = TQStringList::split(" ", config->readEntry( "Klips Debug", ""));
|
|
Vpnc_pid_file = config->readEntry( "Pid file for vpnc ", "/var/run/vpnc/pid" );
|
|
RacoonDebugLevel = config->readEntry( "Racoon debuglevel", "info" );
|
|
// we need to correct old int value
|
|
if (RacoonDebugLevel == "0")
|
|
RacoonDebugLevel="info";
|
|
if (RacoonDebugLevel != "info" && RacoonDebugLevel != "debug" && RacoonDebugLevel != "debug2" )
|
|
RacoonDebugLevel = "info";
|
|
|
|
VpncDebugLevel = config->readNumEntry( "Vpnc debuglevel", 0 );
|
|
KvpncDebugLevel = config->readNumEntry( "Kvpnc debuglevel", 0 );
|
|
PppdDebugLevel = config->readBoolEntry( "Pppd debuglevel", false );
|
|
PppdKernelLogLevel = config->readNumEntry( "Pppd kernel log level", 0 );
|
|
OpenvpnDebugLevel = config->readNumEntry( "Openvpn debuglevel", 0 );
|
|
PptpLogLevel = config->readNumEntry( "Pptp debuglevel", 1 );
|
|
SshDebugLevel = config->readNumEntry( "ssh debuglevel", 1 );
|
|
enableDebugL2tpd = config->readBoolEntry( "enable l2tpd debug", false );
|
|
enableDebugXl2tpd = config->readBoolEntry( "Enable xl2tpd debug", false );
|
|
enableDebugOpenl2tp = config->readBoolEntry( "Enable openl2tp debug", false );
|
|
|
|
enableDebugXl2tpdNetwork = config->readBoolEntry("EnableDebugXl2tpdNetwork",false);
|
|
enableDebugXl2tpdpacket = config->readBoolEntry("EnableDebugXl2tpdpacket",false);
|
|
enableDebugXl2tpdstate = config->readBoolEntry("EnableDebugXl2tpdstate",false);
|
|
enableDebugXl2tpdtunnel = config->readBoolEntry("EnableDebugXl2tpdtunnel",false);
|
|
|
|
|
|
pathToVpnc = config->readEntry( "Path to vpnc-bin", "/usr/sbin/vpnc" );
|
|
pathToCiscoVpnc = config->readEntry( "Path to vpnclient", "/usr/local/bin/vpnclient" );
|
|
pathToSetkey = config->readEntry( "Path to setkey", "/usr/sbin/setkey" );
|
|
pathToRacoon = config->readEntry( "Path to racoon", "/usr/sbin/racoon" );
|
|
pathToRacoonctl = config->readEntry( "Path to racoonctl", "/usr/sbin/racoonctl" );
|
|
pathToIptables = config->readEntry( "Path to iptables", "/sbin/iptables" );
|
|
pathToOpenssl = config->readEntry( "Path to openssl", "/usr/bin/openssl" );
|
|
pathToIpsec = config->readEntry( "Path to freeswan", "/usr/sbin/ipsec" );
|
|
pathToIp = config->readEntry( "Path to iputility", "/sbin/ip" );
|
|
pathToIfconfig = config->readEntry( "Path to ifconfig", "/sbin/ifconfig" );
|
|
pathToRoute = config->readEntry( "Path to route", "/sbin/route" );
|
|
pathToNetstat = config->readEntry( "Path to netstat", "/bin/netstat" );
|
|
pathToPppd = config->readEntry ("Path to pppd","/usr/sbin/pppd");
|
|
pathToPptp = config->readEntry ("Path to pptp","/usr/sbin/pptp");
|
|
pathToL2tpd = config->readEntry ("Path to l2tpd","/usr/sbin/l2tpd");
|
|
pathToXl2tpd = config->readEntry ("Path to xl2tpd","/usr/sbin/xl2tpd");
|
|
pathToOpenl2tp = config->readEntry ("Path to openl2tp","/usr/sbin/openl2tpd");
|
|
pathToKill = config->readEntry ("Path to kill","/bin/kill");
|
|
pathToKillall = config->readEntry ("Path to kill-all","/usr/bin/killall");
|
|
pathToPing = config->readEntry ("Path to ping","/bin/ping");
|
|
pathToOpenvpn = config->readEntry ("Path to openvpn","/usr/sbin/openvpn");
|
|
pathToPkcs11Tool = config->readEntry( "Path to pkcs11-tool", "/usr/bin/pkcs11-tool" );
|
|
pathToVtund = config->readEntry( "Path to vtund", "/usr/sbin/vtund" );
|
|
pathToCiscoCertMgr = config->readEntry( "Path to cisco_cert_mgr","/usr/local/bin/cisco_cert_mgr");
|
|
pathToTail = config->readEntry( "Path to tail","/usr/bin/tail");
|
|
pathToSsh = config->readEntry( "Path to ssh","/usr/bin/ssh");
|
|
pathToKsshAskpass = config->readEntry( "Path to ksshaskpass","/usr/bin/ksshaskpass");
|
|
pathToGnomeSshAskpass = config->readEntry( "Path to ssh-askpass-gnome","/usr/lib/openssh/gnome-ssh-askpass");
|
|
|
|
checkStandardPathValues();
|
|
|
|
tryConnectTimeout = TQString( config->readEntry( "Try connect timeout", "10" ) ).toInt();
|
|
lastProfile = config->readEntry( "Last Profile", "" );
|
|
writeLogFile = config->readBoolEntry( "Write log file", true );
|
|
holdGeneratedScripts = config->readBoolEntry( "Hold generated scripts", true );
|
|
showStatusBar = config->readBoolEntry( "Show Statusbar", true );
|
|
programsInPath = config->readBoolEntry( "Programs in path", true );
|
|
|
|
if (programsInPath)
|
|
useDefaultPaths=true;
|
|
|
|
InfoLogColor = config->readColorEntry ( "Info logwindow color", new TQColor(TQt::black) );
|
|
RemoteLogColor = config->readColorEntry ( "Remote logwindow color", new TQColor(TQt::blue) );
|
|
ErrorLogColor = config->readColorEntry( "Error logwindow color", new TQColor(TQt::red ));
|
|
SuccessLogColor = config->readColorEntry( "Success logwindow color", new TQColor(TQt::darkGreen) );
|
|
DebugLogColor = config->readColorEntry( "Debug logwindow color", new TQColor(255,175,0 ));
|
|
DebugBackgroundcolor = config->readColorEntry("Debug background color", new TQColor (TQt::white) );
|
|
useColorizedLogOutput = config->readBoolEntry("Use colorized log output", true);
|
|
showInterfaceIPinTooltip = config->readBoolEntry( "Show interface IP in tooltip", true );
|
|
AutoConnectProfile= config->readEntry( "Auto connect profile", "" );
|
|
doAutoConnectAtStartup = config->readBoolEntry( "Do auto connect at startup", false );
|
|
LogViewerFontSize = config->readNumEntry( "Log viewer font size", 2 );
|
|
|
|
WindowSize = TQSize( config->readNumEntry( "Mainwindow width", 50 ), this->config->readNumEntry( "Mainwindow height", 50 ) );
|
|
WindowPos = TQPoint ( config->readNumEntry( "Mainwindow position x", 10 ), this->config->readNumEntry( "Mainwindow position y", 50 ) );
|
|
|
|
OpenvpnManagementPort = config->readNumEntry("Openvpn management port", 2222 );
|
|
|
|
appPointer->processEvents();
|
|
|
|
if ( writeLogFile )
|
|
if ( !logfile.isOpen() )
|
|
{
|
|
TDEStandardDirs *dirs = TDEGlobal::dirs();
|
|
|
|
TQDir AppFolder (TQString(dirs->saveLocation( "data" )+"/kvpnc"));
|
|
if (!AppFolder.exists())
|
|
{
|
|
// KMessageBox::error( this, i18n( "creating dir: %1" ).arg(dirs->saveLocation( "data" )+"/kvpnc" ));
|
|
TQDir AppFolder2(dirs->saveLocation( "data" ));
|
|
if(!AppFolder2.mkdir("kvpnc",true))
|
|
{
|
|
KMessageBox::error( 0, i18n( "The appdir for kvpnc could not be created. Be sure that you have write permission of \"%1\"." ).arg(dirs->saveLocation( "data" )) );
|
|
appendLogEntry( i18n( "The appdir for kvpnc could not be created. Be sure that you have write permission of \"%1\"." ).arg(dirs->saveLocation( "data" )),error);
|
|
}
|
|
}
|
|
|
|
logfileName = dirs->saveLocation( "data" );
|
|
logfileName += "/kvpnc/kvpnc.log";
|
|
//KMessageBox::information( this, logfileName, "info" );
|
|
logfile.setName( logfileName );
|
|
if ( !logfile.open( IO_WriteOnly | IO_Append ) )
|
|
{
|
|
KMessageBox::error( 0, i18n( "Log file cant be opened!" ) );
|
|
appendLogEntry(i18n( "Unable to find \"%1\"!" ).arg("pppd"),error);
|
|
}
|
|
else
|
|
{
|
|
TQTextStream s( &logfile );
|
|
s << i18n( "Log session started at: " ) << TQDateTime::currentDateTime().toString( Qt::TextDate ) << endl;
|
|
}
|
|
}
|
|
|
|
useTDEwallet = config->readBoolEntry("Use TDEWallet", true);
|
|
firstUseOfTDEwallet = config->readBoolEntry( "First use of TDEwallet", true );
|
|
feedbackMailSent = config->readBoolEntry("FeedbackMailSent",false);
|
|
doKillL2tpdIfStillRunning = config->readBoolEntry("Do kill l2tpd if still running",true);
|
|
doKillXl2tpdIfStillRunning = config->readBoolEntry("Do kill xl2tpd if still running",true);
|
|
doKillRacoonIfStillRunning = config->readBoolEntry("Do kill racoon if still running",true);
|
|
showConnectionTimeInTooltip = config->readBoolEntry("Show connection time in Tooltip",true);
|
|
enableDebugOpenvpn = config->readBoolEntry("Enable debug Openvpn",false);
|
|
|
|
|
|
|
|
if ( KvpncDebugLevel > 2 )
|
|
appendLogEntry( i18n( "Global configuration loaded." ) ,info);
|
|
|
|
|
|
/* = user data = */
|
|
/* old style: one profile: will be removed in future */
|
|
/*
|
|
config->setGroup( "Client Options" );
|
|
this->mw->gatewayLineEdit->setText( config->readEntry( "VPN Gateway", "" ) );
|
|
this->mw->IDLineEdit->setText( config->readEntry( "VPN ID", "" ) );
|
|
this->mw->PSKLineEdit->setText( config->readEntry( "Group password", "" ) );
|
|
this->mw->UsernameLineEdit->setText( config->readEntry( "Username", "" ) );
|
|
this->mw->PasswordEdit->setText( config->readEntry( "Password", "" ) );
|
|
|
|
this->mw->CheckUserPass->setChecked( config->readBoolEntry( "Save user password", false ) );
|
|
this->mw->CheckGroupPass->setChecked( config->readBoolEntry( "Save group password", false ) );
|
|
*/
|
|
|
|
/* profiles are stored in a group which is named to the following scheme:
|
|
Profile_XXXXX
|
|
XXXXX is the account name (important: unique!)
|
|
*/
|
|
TQStringList configGroups = config->groupList();
|
|
bool oldConfigurationFound = false;
|
|
|
|
bool sessionFound = false;
|
|
|
|
for ( TQStringList::Iterator it = configGroups.begin(); it != configGroups.end(); ++it )
|
|
{
|
|
TQString name = *it;
|
|
name.stripWhiteSpace();
|
|
if ( name.left( 7 ) == "Profile" && name.length() > 8 )
|
|
{
|
|
// Profile found
|
|
|
|
sessionFound = true;
|
|
|
|
if ( KvpncDebugLevel > 2 )
|
|
{
|
|
TQString tmp = i18n( "Profile found: " );
|
|
tmp += name.right( ( name.length() ) - 8 );
|
|
appendLogEntry ( tmp, debug );
|
|
}
|
|
config->setGroup( name );
|
|
TQString UserPassword="";
|
|
TQString PrivateKeyPass="";
|
|
TQString PreSharedKey ="";
|
|
|
|
/* passwords with tdewallet */
|
|
if (useTDEwallet && TDEWallet::Wallet::isEnabled())
|
|
{
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n( "Wallet enabled and available, reading passwords from wallet." ),debug);
|
|
// Open local wallet
|
|
wallet = TDEWallet::Wallet::openWallet(TDEWallet::Wallet::LocalWallet());
|
|
if (wallet != 0)
|
|
{
|
|
TQString walletname="kvpnc";
|
|
|
|
if (!wallet->hasFolder(walletname))
|
|
{
|
|
wallet->createFolder(walletname);
|
|
wallet->sync();
|
|
}
|
|
|
|
if (wallet->setFolder(walletname))
|
|
{
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n( "Folder for kvpnc has been set." ),debug);
|
|
|
|
TQString profilename = name.right( ( name.length() ) - 8 );
|
|
|
|
if (wallet->readPassword(TQString(profilename+"__user_pw"), UserPassword) != 0)
|
|
appendLogEntry(i18n( "read of %1 has failed." ).arg(i18n("user password")),error);
|
|
else
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n( "read of %1 was successful." ).arg(i18n("user password")),debug);
|
|
|
|
if (wallet->readPassword(TQString(profilename+"__psk"), PreSharedKey) != 0)
|
|
appendLogEntry(i18n( "read of %1 has failed." ).arg(i18n("preshared key")),error);
|
|
else
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n( "read of %1 was successful." ).arg(i18n("preshared key")),debug);
|
|
|
|
if (wallet->readPassword(TQString(profilename+"__priv_key_pwd"), PrivateKeyPass) != 0)
|
|
appendLogEntry(i18n( "read of %1 has failed." ).arg(i18n("preshared key password")),error);
|
|
else
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n( "read of %1 was successful." ).arg(i18n("preshared key password")),debug);
|
|
}
|
|
else
|
|
{
|
|
KMessageBox::error( 0, i18n( "Unable to set wallet folder for kvpnc!" ) );
|
|
appendLogEntry(i18n( "Unable to set wallet folder for kvpnc!" ), error);
|
|
}
|
|
appPointer->processEvents();
|
|
}
|
|
else
|
|
{
|
|
KMessageBox::error( 0, i18n( "Unable to open wallet folder for kvpnc!" ) );
|
|
appendLogEntry(i18n( "Unable to open wallet folder for kvpnc!" ), error);
|
|
}
|
|
|
|
|
|
}
|
|
else
|
|
{
|
|
if (KvpncDebugLevel > 2)
|
|
{
|
|
if (useTDEwallet && TDEWallet::Wallet::isEnabled() && firstUseOfTDEwallet)
|
|
appendLogEntry(i18n( "Wallet enabled, available but first time, reading passwords from config file." ),debug);
|
|
else
|
|
appendLogEntry(i18n( "Wallet disabled or not available, reading passwords from config file." ),debug);
|
|
}
|
|
// read from config file
|
|
UserPassword = config->readEntry( "User password", "" );
|
|
PrivateKeyPass = config->readEntry( "PrivateKey password", "" );
|
|
PreSharedKey = config->readEntry( "Pre shared key", "" );
|
|
}
|
|
|
|
VpnAccountData::ConnectionType ConnType = VpnAccountData::ConnectionType( VpnAccountData::cisco );
|
|
TQString type_string = config->readEntry( "Connection type", "cisco" );
|
|
|
|
if ( type_string == "cisco" )
|
|
ConnType = VpnAccountData::cisco;
|
|
else if ( type_string == "ciscoorig" )
|
|
ConnType = VpnAccountData::ciscoorig;
|
|
else if ( type_string == "racoon" )
|
|
ConnType = VpnAccountData::racoon;
|
|
else if ( type_string == "l2tpd (racoon)" )
|
|
ConnType = VpnAccountData::l2tpd_racoon;
|
|
else if ( type_string == "freeswan" )
|
|
ConnType = VpnAccountData::freeswan;
|
|
else if ( type_string == "l2tpd (openswan)" )
|
|
ConnType = VpnAccountData::l2tpd_freeswan;
|
|
else if ( type_string == "pptp" )
|
|
ConnType = VpnAccountData::pptp;
|
|
else if ( type_string == "openvpn" )
|
|
ConnType = VpnAccountData::openvpn;
|
|
else if ( type_string == "vtun" )
|
|
ConnType = VpnAccountData::vtun;
|
|
else if ( type_string == "ssh" )
|
|
ConnType = VpnAccountData::ssh;
|
|
else
|
|
ConnType = VpnAccountData::other;
|
|
|
|
TQString Name = name.right( name.length() - 8 );
|
|
VpnAccountData *data = new VpnAccountData( ConnType, Name );
|
|
data->setGateway( config->readEntry( "VPN Gateway", "" ));
|
|
data->setID( config->readEntry( "VPN ID", "" ) );
|
|
data->setDescription( config->readEntry("Description",""));
|
|
data->setUserName( config->readEntry( "Username", "" ));
|
|
data->setSaveUserPassword( config->readBoolEntry( "Save user password", false ));
|
|
data->setSavePsk( config->readBoolEntry( "Save PSK", false ));
|
|
data->setSavePrivateKeyPassword( config->readBoolEntry( "Save private key password", true ) );
|
|
data->setUseAdvancedSettings( config->readBoolEntry( "Use advanced settings", false ));
|
|
data->setApplicationVersion( config->readEntry( "Application version", "Cisco Systems VPN Client 0.3-rm+zomb.1:Linux" ));
|
|
data->setLocalPort( config->readNumEntry( "Local port", 500 ));
|
|
data->setRemotePort( config->readNumEntry( "Remote port", 500 ));
|
|
data->setNtDomainName( config->readEntry( "NT domain name", "" ));
|
|
data->setPerfectForwardSecrety( config->readEntry( "Perfect forward secrety", "server" ));
|
|
data->setIkeGroup( config->readEntry( "IKE group", "dh1" ));
|
|
data->setUseApplicationVersion( config->readBoolEntry( "Use application version", false ));
|
|
data->setUseGlobalIpsecSecret( config->readBoolEntry( "Use global IPSec secret", false ));
|
|
data->setUseIkeGroup( config->readBoolEntry( "Use IKE group", false ));
|
|
data->setUseLocalPort( config->readBoolEntry( "Use local port", false ));
|
|
data->setUseRemotePort( config->readBoolEntry( "Use remote port", false ));
|
|
data->setUseNtDomainName( config->readBoolEntry( "Use NT domain name", false ));
|
|
data->setUseSingleDes( config->readBoolEntry( "Use single DES", false ));
|
|
data->setUsePerfectForwardSecrety( config->readBoolEntry( "Use perfect Forward Secrety", false ));
|
|
data->setX509Certificate( config->readEntry( "x509 certificate", "" ));
|
|
data->setCaCertificate( config->readEntry( "Ca certificate", "" ));
|
|
data->setNetworkDevice( config->readEntry( "Network device", "default" ));
|
|
data->setCertPath( config->readEntry( "Cert path", "/etc/racoon/certs" ));
|
|
data->setPrivateKey( config->readEntry( "Private key", "" ));
|
|
VpnAccountData::AuthenticationType authtype;
|
|
if ( config->readEntry( "Auth type", "cert" ) == "cert" )
|
|
authtype = VpnAccountData::cert;
|
|
else if ( config->readEntry( "Auth type", "psk" ) == "psk" )
|
|
authtype = VpnAccountData::psk;
|
|
else if ( config->readEntry( "Auth type", "cert" ) == "hybrid" )
|
|
authtype = VpnAccountData::hybrid;
|
|
else
|
|
authtype = VpnAccountData::unknownauth;
|
|
data->setAuthType(authtype);
|
|
|
|
appPointer->processEvents();
|
|
|
|
data->setDoPingIP( config->readBoolEntry( "do ping ip", false ));
|
|
data->setPingHostIP( config->readEntry( "Ping host IP", "" ));
|
|
data->setUseSpecialRemoteID( config->readBoolEntry( "Use special remote ID", false ));
|
|
data->setUseSpecialLocalID( config->readBoolEntry( "Use special local ID", false ));
|
|
data->setSpecialRemoteID( config->readEntry( "Special remote ID", "" ));
|
|
data->setSpecialLocalID( config->readEntry( "Special local ID", "" ));
|
|
data->setLocalIDType(config->readEntry( "Local ID type", "asn1dn") );
|
|
data->setRemoteIDType(config->readEntry( "Remote ID type", "none") );
|
|
data->setUseSpecialServerCertificate( config->readBoolEntry( "Use special server certificate", false ));
|
|
data->setSpecialServerCertificate( config->readEntry( "Special server certificate", "" ));
|
|
data->setUseUdp( config->readBoolEntry( "Use UDP-protocol", false ));
|
|
data->setUseUdpPort( config->readBoolEntry( "Use UDP-port", false ));
|
|
data->setUdpPort( config->readNumEntry( "local UDP port", 4500 ));
|
|
data->setUseDnsUpdate( config->readBoolEntry( "use DNS_UPDATE", true));
|
|
data->setUseDnsServer( config->readBoolEntry( "use DNS-server", false));
|
|
data->setDnsServer( config->readEntry( "DNS server", "" ));
|
|
data->setRefuse40BitEncryption( config->readBoolEntry( "refuse 40 bit encryption", true ));
|
|
data->setRefuse128BitEncryption( config->readBoolEntry( "refuse 128 bit encryption", false ));
|
|
data->setAllowStatefulMode( config->readBoolEntry( "require stateless encryption",false ));
|
|
data->setRequireMppe( config->readBoolEntry( "require mppe", true ));
|
|
data->setUseNoBsdComp( config->readBoolEntry( "Use no BSD compression", true ));
|
|
data->setUseNoIpDefault(config->readBoolEntry( "Do not use no IP by default", false));
|
|
data->setUseNoDeflate( config->readBoolEntry( "Use no deflate", true ));
|
|
data->setDisableMPPEComp( config->readBoolEntry( "Disable MPPE compression", false ));
|
|
data->setLocalVirtualIP( config->readEntry( "Local virtual IP", "" ));
|
|
data->setRemoteVirtualIP( config->readEntry( "Remote virtual IP", "" ));
|
|
data->setPreSharedKeyFile( config->readEntry( "Pre shared key file", "" ));
|
|
data->setExecuteCmdBeforeConnect( config->readBoolEntry( "Execute command before connect",false));
|
|
data->setExecuteCmdAfterConnect( config->readBoolEntry( "Execute command after connect",false));
|
|
data->setExecuteCmdBeforeDisconnect( config->readBoolEntry( "Execute command before disconnect", false));
|
|
data->setExecuteCmdAfterDisconnect( config->readBoolEntry( "Execute command after disconnect", false));
|
|
data->setCommandBeforeConnect( config->readEntry( "Command before connect", "" ));
|
|
data->setCommandAfterConnect( config->readEntry( "Command after connect", "" ));
|
|
data->setCommandBeforeDisconnect( config->readEntry( "Command before disconnect", "" ));
|
|
data->setCommandAfterDisconnect( config->readEntry( "Command after disconnect", "" ));
|
|
data->setReplaceDefaultRoute( config->readBoolEntry( "Replace default route", false ));
|
|
data->setUseMtu( config->readBoolEntry( "Use own MTU", false ));
|
|
data->setUseMru( config->readBoolEntry( "Use own MRU", false ));
|
|
data->setMtu( config->readNumEntry( "MTU for pppd", 1492 ));
|
|
data->setMru( config->readNumEntry( "MRU for pppd", 1492 ));
|
|
data->setUseVirtualIP( config->readBoolEntry( "Use virtual IP", false ));
|
|
data->setVirtualIP( config->readEntry( "Virtual IP", "" ));
|
|
data->setPskIsInFile( config->readBoolEntry( "PSK is in file", false ));
|
|
data->setUseAdditionalNetworkRoutes( config->readBoolEntry( "Use additional network routes", false ));
|
|
appPointer->processEvents();
|
|
TQString AdditionalNetworkRoutesString = config->readEntry( "Additional network routes", "" );
|
|
// Networks delimited by a ','
|
|
TQStringList AdditionalNetworkRoutes(TQStringList::split( ",", AdditionalNetworkRoutesString ));
|
|
data->setAdditionalNetworkRoutes(AdditionalNetworkRoutes);
|
|
data->setHashAlgo( config->readEntry( "Hash algorithm", "md5" ));
|
|
data->setEncryptionAlgorithm( config->readEntry( "Encryption algorithm", "3des" ));
|
|
data->setAuthenticationAlgorithm( config->readEntry( "Authentication algorithm", "hmac_sha1" ));
|
|
data->setTunnelDeviceType( config->readEntry( "Tunnel device type", "tun" ));
|
|
data->setUseUserdefinedPort( config->readBoolEntry( "Use userdefined port", false ));
|
|
data->setUserdefinedPort( config->readNumEntry( "Userdefined port", 1194 ));
|
|
data->setNsCertType( config->readEntry( "NS cert type", "client" ));
|
|
data->setUseNsCertType( config->readBoolEntry( "Use NS cert type", false ));
|
|
data->setUseConnectionStatusCheck ( config->readBoolEntry( "Use connection status check", true ));
|
|
data->setConnectionStatusCheckSuccessCount ( config->readNumEntry( "Connection check success count", 4 ));
|
|
data->setConnectionStatusInterval ( config->readNumEntry( "Connection check status interval", 1 ));
|
|
data->setDoReconnectAfterConnectionLost(config->readBoolEntry("Do reconnect after connection lost", false));
|
|
data->setDisableLzoCompression(config->readBoolEntry("Disable LZO compression", true));
|
|
data->setUserPassword( UserPassword );
|
|
data->setRemoteNetAddr( config->readEntry("Remote net address","") );
|
|
data->setRemoteNetMask( TQString().setNum(config->readNumEntry("Remote net mask",24 )));
|
|
data->setPreSharedKey( PreSharedKey );
|
|
data->setPrivateKeyPass( PrivateKeyPass );
|
|
data->setAuthWithUsernameAndPassword( config->readBoolEntry( "AuthWithUsernameAndPassword",false ) );
|
|
data->setAllowEmptyGroupPassword( config->readBoolEntry( "AllowEmptyGroupPassword", false ) );
|
|
data->setUseUserdefiniedCipher( config->readBoolEntry( "Use userdefinied cipher", false ) );
|
|
data->setUserdefiniedCipher( config->readEntry( "Userdefinied cipher", "" ) );
|
|
appPointer->processEvents();
|
|
data->setUseRedirectGateway( config->readBoolEntry( "Use redirect gateway", false ) );
|
|
data->setUseTlsAuth( config->readBoolEntry( "Use TLS auth", false ) );
|
|
data->setTlsAuthFile( config->readEntry( "TLS auth file", "" ) );
|
|
data->setUseHttpProxy( config->readBoolEntry( "Use HTTP proxy", false ) );
|
|
data->setHttpProxy( config->readEntry( "HTTP proxy host", "" ) );
|
|
data->setHttpProxyPort( config->readNumEntry( "HTTP proxy port", 8080 ) );
|
|
data->setHttpProxyTimeout( config->readNumEntry( "HTTP proxy timeout", 5 ) );
|
|
data->setDontSaveUsername( config->readBoolEntry( "Dont save username", false ) );
|
|
data->setUseModeConfig( config->readBoolEntry( "Use mode config", false ) );
|
|
data->setExchangeMode( config->readEntry( "Exchange mode", "main" ) );
|
|
data->setUseReconnectDelay( config->readBoolEntry( "Use delay at reconnect", false ) );
|
|
data->setReconnectDelay( config->readNumEntry( "Reconnect delay", 5 ) );
|
|
data->setUseTlsRemoteHost( config->readBoolEntry( "Use TLS host", false) );
|
|
data->setTlsRemoteHost( config->readEntry( "TLS remote host", "") );
|
|
data->setDisableOpportunisticEncryption( config->readBoolEntry( "Disable opportunistic encryption", false ) );
|
|
data->setRightNextHop( config->readEntry( "Right next hop", "" ) );
|
|
data->setLeftNextHop( config->readEntry( "Left next hop", "" ) );
|
|
data->setUseMssfix(config->readBoolEntry( "Use userdef packet size", false) );
|
|
data->setUseFragment(config->readBoolEntry( "Use userdefinied packet size for fragmentation" , false) );
|
|
data->setMssfix(config->readNumEntry( "Mssfix", 1300) );
|
|
data->setFragment( config->readNumEntry( "Fragment", 1300) );
|
|
data->setPeerTimeout( config->readNumEntry( "PeerTimeout",0) );
|
|
data->setDisableCcp( config->readBoolEntry("Disable CCP",false) );
|
|
data->setUseSmartcard( config->readBoolEntry("Use smartcard", false) );
|
|
data->setUseXauthInteractive(config->readBoolEntry("Use Xauth interactive", false) );
|
|
data->setUseHttpProxyAuth( config->readBoolEntry("Use HTTP Proxy Authentication", false ) );
|
|
data->setHttpProxyAuthType( config->readEntry("HTTP Proxy Authtype", "basic") );
|
|
data->setHttpProxyUser( config->readEntry("Use HTTP Proxy Auth user", "") );
|
|
data->setHttpProxyPass( config->readEntry("Use HTTP Proxy Auth pass", "") );
|
|
data->setUseOnlyCaCertAndUserAuth(config->readBoolEntry("Use only CA cert and user auth", false) );
|
|
data->setUseMailAddressAsIdentifier(config->readBoolEntry("Use mail address as identifier", false) );
|
|
data->setUseRightNextHop(config->readBoolEntry("Use right next hop", false) );
|
|
data->setUseLeftNextHop(config->readBoolEntry("Use left next hop", false) );
|
|
data->setPkcs11Providers(config->readEntry("Pkcs11 providers", "/usr/local/lib/libetpkcs11.so" ) );
|
|
data->setPkcs11SlotType(config->readEntry("Pkcs11 slot type", "id") );
|
|
data->setPkcs11Slot(config->readEntry("Pkcs11 slot", "0") );
|
|
data->setPkcs11IdType(config->readEntry("Pkcs11 id type", "id") );
|
|
data->setPkcs11Id(config->readEntry("Pkcs11 id","" ) );
|
|
data->setPkcs11SignMode(config->readEntry("Pkcs11 sign mode", "auto") );
|
|
data->setUsePkcs11Providers(config->readBoolEntry("Use Pkcs11 providers", false) );
|
|
data->setAllowEmptyPrivateKeyPassword( config->readBoolEntry("Allow empty private key password", false ));
|
|
data->setAllowIpAddressChangeOfPeer(config->readBoolEntry("Allow ip address change of peer", false));
|
|
data->setAuthMethod(config->readEntry("Auth method", "mschap-v2"));
|
|
data->setCommandAfterConnectDelayTime(config->readNumEntry("Command after connect delay time", 5));
|
|
data->setUseSearchDomainInResolvConf(config->readBoolEntry("Use search domain in resolv conf",false));
|
|
data->setUseDomainInResolvConf(config->readBoolEntry("Use domain in resolv conf",false));
|
|
data->setSearchDomainInResolvConf(config->readEntry("Search domain in resolv conf",""));
|
|
data->setDomainInResolvConf(config->readEntry("Domain in resolv conf",""));
|
|
data->setAuthenticationDirection(config->readEntry("Authentication direction","none"));
|
|
data->setCiscoNatMode(config->readEntry("CiscoNatMode", "natt"));
|
|
data->setIpsecEsp(config->readEntry("IPSec ESP","3des-md5,3des-sha1,aes128-sha1,aes256-sha1"));
|
|
data->setIpsecIke(config->readEntry("IPSec IKE","aes256-sha1,aes128-sha1,3des-sha1-modp2048,3des-md5,3des-sha1"));
|
|
data->setVtunProfile(config->readEntry("Vtun profile",""));
|
|
data->setDisableDataEncryption(config->readBoolEntry("Disable data encryption", false));
|
|
data->setUseAuthenticationAlgorithm(config->readBoolEntry("Use authentication algorithm", false));
|
|
data->setFixPathMtuDiscoveryProblem(config->readBoolEntry("Fix path mtu discovery problem" , false));
|
|
data->setUseRemoteNetwork(config->readBoolEntry("Use remote network",false));
|
|
data->setIpsecVpnMode(config->readEntry("Ipsec vpn mode", "tunnel"));
|
|
data->setDisableHeaderCompression(config->readBoolEntry("DisableHeaderCompression",false));
|
|
data->setDisableMagicNumberNegotiation(config->readBoolEntry("DisableMagicNumberNegotiation",false));
|
|
data->setDisableIpx(config->readBoolEntry("DisableIpx",false));
|
|
data->setDisableProtocolFieldCompression(config->readBoolEntry("Disable protocol field compression",false));
|
|
data->setDisableAdressControlCompression(config->readBoolEntry("Disable adress control compression",false));
|
|
data->setUseCustomIke(config->readBoolEntry("Use custom ike",false));
|
|
data->setUseCustomEsp(config->readBoolEntry("Use custom esp",false));
|
|
data->setVerifyCaCert(config->readBoolEntry("Verify ca cert",true));
|
|
data->setUseDpdIdleTimeout(config->readBoolEntry("Use DPD idle timeout",false));
|
|
data->setDpdIdleTimeout(config->readNumEntry("DPD idle timeout",300));
|
|
data->setHideGroupPasswordInAccountDataDialog(config->readBoolEntry("Hide group password in accountdata dialog",false));
|
|
data->setMaxConnectTries(config->readNumEntry("MaxConnectTries",300));
|
|
data->setL2tpDaemon((VpnAccountData::L2tpDaemonType)config->readNumEntry("L2tpDaemon",0));
|
|
data->setUseLeftSourceIp(config->readBoolEntry("UseLeftSourceIp",false));
|
|
data->setUseRightSourceIp(config->readBoolEntry("UseRightSourceIp",false));
|
|
data->setLeftSourceIp(config->readEntry("LeftSourceIp",""));
|
|
data->setRightSourceIp(config->readEntry("RightSourceIp",""));
|
|
data->setUseVirtualSubnetworks(config->readBoolEntry("Use virtual subnets",false));
|
|
data->setVirtualSubnetworks(config->readEntry("Virtual subnets", ""));
|
|
data->setDisablePushFromServer(config->readBoolEntry("DisablePushFromServer",false));
|
|
data->setDisableBind(config->readBoolEntry("DisableBind",false));
|
|
data->setUseRenegSec( config->readBoolEntry("UseRenegSec", false));
|
|
data->setRenegSec(config->readNumEntry("RenegSec", 3600));
|
|
data->setUseTunnelPing(config->readBoolEntry("UseTunnelPing", false));
|
|
data->setTunnelPing(config->readNumEntry("TunnelPing",10));
|
|
data->setUseTunnelPingRestart(config->readBoolEntry("UseTunnelPingRestart", false));
|
|
data->setTunnelPingRestart(config->readNumEntry("TunnelPingRestart", 120));
|
|
data->setRequireEap(config->readBoolEntry("RequireEap", false));
|
|
data->setUseSshConfigRemoteScript(config->readBoolEntry("UseSshConfigRemoteScript", false));
|
|
data->setSshConfigRemoteScript(config->readEntry("SshConfigRemoteScript", ""));
|
|
data->setAskUserPasswordOnEachConnect(config->readBoolEntry("AskUserPasswordOnEachConnect", false));
|
|
data->setUseCiscoCertStore( config->readBoolEntry("UseCiscoCertStore", false));
|
|
data->setUseNat(config->readBoolEntry("UseNat", true));
|
|
|
|
appPointer->processEvents();
|
|
AccountList->append( data );
|
|
}
|
|
|
|
if ( name == "Client Options" )
|
|
{
|
|
// old style configuration found
|
|
config->setGroup( "Client Options" );
|
|
TQString Name = "Default";
|
|
VpnAccountData::ConnectionType ConnType = VpnAccountData::cisco;
|
|
TQString Gateway = config->readEntry( "VPN Gateway", "" );
|
|
TQString ID = config->readEntry( "VPN ID", "" );
|
|
TQString Psk = config->readEntry( "Group password", "" );
|
|
TQString Username = config->readEntry( "Username", "" );
|
|
TQString UserPassword = config->readEntry( "Password", "" );
|
|
bool saveUserPassword = config->readBoolEntry( "Save user password", false );
|
|
bool savePsk = config->readBoolEntry( "Save group password", false );
|
|
|
|
VpnAccountData *AccData = new VpnAccountData( ConnType, Name);
|
|
AccData->setGateway ( Gateway );
|
|
AccData->setID( ID );
|
|
AccData->setPreSharedKey( Psk);
|
|
AccData->setUserName( Username );
|
|
AccData->setUserPassword( UserPassword );
|
|
AccData->setSaveUserPassword( saveUserPassword );
|
|
AccData->setSavePsk( savePsk );
|
|
AccData->setLocalPort( 500 );
|
|
AccData->setPerfectForwardSecrety ( "server" );
|
|
AccData->setIkeGroup( "dh1" );
|
|
AccountList->append( AccData );
|
|
|
|
lastProfile = "Default";
|
|
|
|
// now mark for deleting old configuration
|
|
oldConfigurationFound = true;
|
|
if ( KvpncDebugLevel > 2 )
|
|
appendLogEntry ( i18n( "Old configuration found, converted." ),info );
|
|
|
|
if ( KvpncDebugLevel > 2 )
|
|
appendLogEntry( i18n( "Configuration for profile \"%1\" loaded." ).arg( Name ),info );
|
|
|
|
appPointer->processEvents();
|
|
}
|
|
|
|
|
|
}
|
|
if ( oldConfigurationFound )
|
|
{
|
|
// delete configuration file
|
|
TDEStandardDirs * dirs = TDEGlobal::dirs();
|
|
TQString filePath = dirs->findResource ( "config", "kvpncrc" );
|
|
TQFile::remove
|
|
( filePath );
|
|
if ( KvpncDebugLevel > 2 )
|
|
appendLogEntry ( i18n( "Old configuration deleted." ), debug );
|
|
}
|
|
}
|
|
|
|
void KVpncConfig::checkStandardPathValues()
|
|
{
|
|
if (pathToVpnc.isEmpty())
|
|
pathToVpnc = "/usr/sbin/vpnc";
|
|
|
|
if (pathToCiscoVpnc.isEmpty())
|
|
pathToCiscoVpnc = "/usr/local/bin/vpnclient";
|
|
|
|
if (pathToSetkey.isEmpty())
|
|
pathToSetkey = "/usr/sbin/setkey";
|
|
|
|
if (pathToRacoon.isEmpty())
|
|
pathToRacoon = "/usr/sbin/racoon";
|
|
|
|
if (pathToRacoonctl.isEmpty())
|
|
pathToRacoonctl = "/usr/sbin/racoonctl";
|
|
|
|
if (pathToIptables.isEmpty())
|
|
pathToIptables = "/sbin/iptables";
|
|
|
|
if (pathToOpenssl.isEmpty())
|
|
pathToOpenssl = "/usr/bin/openssl";
|
|
|
|
if (pathToIpsec.isEmpty())
|
|
pathToIpsec = "/usr/sbin/ipsec";
|
|
|
|
if (pathToIp.isEmpty())
|
|
pathToIp = "/sbin/ip";
|
|
|
|
if (pathToIfconfig.isEmpty())
|
|
pathToIfconfig = "/sbin/ifconfig";
|
|
|
|
if (pathToRoute.isEmpty())
|
|
pathToRoute = "/sbin/route";
|
|
|
|
if (pathToNetstat.isEmpty())
|
|
pathToNetstat = "/bin/netstat";
|
|
|
|
if (pathToPppd.isEmpty())
|
|
pathToPppd = "/usr/sbin/pppd";
|
|
|
|
if (pathToPptp.isEmpty())
|
|
pathToPptp = "/usr/sbin/pptp";
|
|
|
|
if (pathToL2tpd.isEmpty())
|
|
pathToL2tpd = "/usr/sbin/l2tpd";
|
|
|
|
if (pathToXl2tpd.isEmpty())
|
|
pathToXl2tpd = "/usr/sbin/xl2tpd";
|
|
|
|
if (pathToOpenl2tp.isEmpty())
|
|
pathToOpenl2tp = "/usr/sbin/openl2tpd";
|
|
|
|
if (pathToKill.isEmpty())
|
|
pathToKill = "/bin/kill";
|
|
|
|
if (pathToKillall.isEmpty())
|
|
pathToKillall = "/usr/bin/killall";
|
|
|
|
if (pathToPing.isEmpty())
|
|
pathToPing = "/bin/ping";
|
|
|
|
if (pathToOpenvpn.isEmpty())
|
|
pathToOpenvpn = "/usr/sbin/openvpn";
|
|
|
|
if (pathToPkcs11Tool.isEmpty())
|
|
pathToPkcs11Tool = "/usr/bin/pkcs11-tool";
|
|
|
|
if (pathToVtund.isEmpty())
|
|
pathToVtund = "/usr/sbin/vtund";
|
|
|
|
if (pathToCiscoCertMgr.isEmpty())
|
|
pathToCiscoCertMgr = "/usr/local/bin/cisco_cert_mgr";
|
|
|
|
if (pathToTail.isEmpty())
|
|
pathToTail = "/usr/bin/tail";
|
|
|
|
if (pathToSsh.isEmpty())
|
|
pathToSsh = "/usr/bin/ssh";
|
|
|
|
if (pathToKsshAskpass.isEmpty())
|
|
pathToKsshAskpass = "/usr/bin/ksshaskpass";
|
|
|
|
if (pathToGnomeSshAskpass.isEmpty())
|
|
pathToGnomeSshAskpass = "/usr/lib/openssh/gnome-ssh-askpass";
|
|
}
|
|
|
|
bool KVpncConfig::exportKvpncConfig(TQString filename)
|
|
{
|
|
bool ok=true;
|
|
int exportCount=0;
|
|
bool exportGlobal=false;
|
|
TQFile exportfile (filename);
|
|
if (exportfile.exists())
|
|
{
|
|
int res = KMessageBox::questionYesNo ( 0, i18n ( "\"%1\" still exists. Do you really want to overwrite it?" ).arg ( filename ), i18n ( "Overwrite?" ), i18n("&Overwrite") , KStdGuiItem::cancel() );
|
|
|
|
if (res == 4)
|
|
ok=false;
|
|
}
|
|
if (ok==true)
|
|
{
|
|
if( exportfile.open(IO_WriteOnly))
|
|
{
|
|
TQPtrList<VpnAccountData> *exportAccountList = new TQPtrList<VpnAccountData>();
|
|
exportAccountList->setAutoDelete( TRUE ); // the list owns the objects
|
|
KvpncImportProfileSelectionBase selectdlg;
|
|
VpnAccountData *it=NULL;
|
|
selectdlg.OpenProfileManagerCheckBox->hide();
|
|
selectdlg.textLabel->setText(i18n("Select profiles for export:"));
|
|
selectdlg.ImportPushButton->setText(i18n("&Export selected profiles..."));
|
|
selectdlg.ImportGlobalSettingsCheckBox->setText(i18n("export &global settings"));
|
|
|
|
if ( !AccountList->isEmpty() )
|
|
{
|
|
selectdlg.ImportProfileListView->takeItem(selectdlg.ImportProfileListView->currentItem());
|
|
selectdlg.ImportProfileListView->addColumn(i18n("Name"));
|
|
selectdlg.ImportProfileListView->addColumn(i18n("Type"));
|
|
selectdlg.ImportProfileListView->addColumn(i18n("Gateway"));
|
|
TQCheckListItem *item;
|
|
for ( it = AccountList->first(); it; it = AccountList->next() )
|
|
{
|
|
TQString name = it->getName();
|
|
TQString type;
|
|
if ( it->getConnectionType() == VpnAccountData::cisco )
|
|
type = "cisco" ;
|
|
else if ( it->getConnectionType() == VpnAccountData::ciscoorig )
|
|
type = "ciscoorig" ;
|
|
else if ( it->getConnectionType() == VpnAccountData::racoon )
|
|
type = "racoon" ;
|
|
else if ( it->getConnectionType() == VpnAccountData::l2tpd_racoon )
|
|
type = "l2tpd (racoon)" ;
|
|
else if ( it->getConnectionType() == VpnAccountData::freeswan )
|
|
type = "freeswan" ;
|
|
else if ( it->getConnectionType() == VpnAccountData::l2tpd_freeswan )
|
|
type = "l2tpd (openswan)" ;
|
|
else if ( it->getConnectionType() == VpnAccountData::pptp )
|
|
type = "pptp" ;
|
|
else if ( it->getConnectionType() == VpnAccountData::openvpn )
|
|
type = "openvpn" ;
|
|
else if ( it->getConnectionType() == VpnAccountData::vtun )
|
|
type = "vtun" ;
|
|
else if ( it->getConnectionType() == VpnAccountData::ssh )
|
|
type = "ssh" ;
|
|
|
|
else
|
|
type = i18n("other");
|
|
|
|
|
|
// litem->setSelectable(true);
|
|
item = new TQCheckListItem(selectdlg.ImportProfileListView,it->getName(),TQCheckListItem::CheckBox);
|
|
item->setText(1,type);
|
|
item->setText(2,it->getGateway());
|
|
selectdlg.ImportProfileListView->insertItem(item);
|
|
|
|
// std::cout << "insert profile into listview: " << name << std::endl;
|
|
}
|
|
}
|
|
bool ret = selectdlg.exec();
|
|
if (ret == true)
|
|
{
|
|
TQListViewItemIterator it2( selectdlg.ImportProfileListView );
|
|
for ( ; it2.current(); ++it2 )
|
|
{
|
|
if ( ( (TQCheckListItem*)it2.current() )->isOn() )
|
|
{
|
|
VpnAccountData *data=NULL;
|
|
it = 0;
|
|
for ( it = AccountList->first(); it; it = AccountList->next() )
|
|
if ( it->getName() == ( (TQCheckListItem*)it2.current() )->text() && ( (TQCheckListItem*)it2.current() )->isOn() )
|
|
data = it;
|
|
exportAccountList->append(data);
|
|
}
|
|
}
|
|
exportGlobal = selectdlg.ImportGlobalSettingsCheckBox->isChecked();
|
|
if (exportAccountList->count() == 0 && exportGlobal==false)
|
|
{
|
|
KMessageBox::sorry ( 0, i18n ( "No profiles for export, export canceled." ) );
|
|
exportfile.close();
|
|
exportfile.remove();
|
|
return false;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
KMessageBox::sorry ( 0, i18n ( "Export canceled." ) );
|
|
exportfile.close();
|
|
exportfile.remove();
|
|
return false;
|
|
}
|
|
|
|
|
|
|
|
TQString date (__DATE__);
|
|
TQString day= date.section(' ',0,0);
|
|
TQString month= TQString().setNum(TQDate::fromString(date.section(' ',0,0),Qt::ISODate).month());
|
|
TQString year= date.section(' ',2,2);
|
|
|
|
TQString currentdate ( date+" "+ TQTime().currentTime().toString( "hh:mm" ) );
|
|
|
|
TQTextStream ExportStream ( &exportfile );
|
|
ExportStream << "<?xml version=\"1.0\" encoding=\"UTF-8\"?>" << "\n";
|
|
ExportStream << "<!-- generated by kvpnc at " << currentdate<< ". Do not edit it. -->" << "\n";
|
|
ExportStream << "<kvpnc>" << "\n";
|
|
ExportStream << "\t<version>" << "\n";
|
|
ExportStream << "\t\t<app>" << "0.9.2" << "</app>" << "\n";
|
|
ExportStream << "\t\t<exportversion>" << "1" << "</exportversion>" << "\n";
|
|
ExportStream << "\t</version>" << "\n";
|
|
|
|
if (exportGlobal == true)
|
|
{
|
|
ExportStream << "\t<global>" << "\n";
|
|
ExportStream << "\t\t<option name=\"Minimize after connect\"" << " type=\"bool\"" << ">" << int(minimizeAfterConnect)<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Hide on startup\"" << " type=\"bool\"" << ">" << int(hideMainWindow)<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Use silent quit\"" << " type=\"bool\"" << ">" << int(useSilentQuit)<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Dont quit on CloseEvent\"" << " type=\"bool\"" << ">" << int(dontQuitOnCloseEvent)<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Enable pppd debug\"" << " type=\"bool\"" << ">" << int(enableDebugPppd)<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Enable pptpd debug\"" << " type=\"bool\"" << ">" << int(enableDebugPptpd)<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Enable l2tpd debug\"" << " type=\"bool\"" << ">" << int(enableDebugL2tpd)<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Enable xl2tpd debug\"" << " type=\"bool\"" << ">" << int(enableDebugXl2tpd)<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Enable openl2tp debug\"" << " type=\"bool\"" << ">" << int(enableDebugOpenl2tp)<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Enable FreeSWAN verbose\"" << " type=\"bool\"" << ">" << int(enableFreeswanVerbose)<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Pluto Debug\"" << " type=\"stringlist\"" << ">" << PlutoDebug.join(" ") << "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Klips Debug\"" << " type=\"stringlist\"" << ">" << KlipsDebug.join(" ") << "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Show debugconsole\"" << " type=\"bool\"" << ">" << int(showDebugConsole)<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Pid file for vpnc \"" << " type=\"string\"" << ">" << Vpnc_pid_file<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Vpnc debuglevel\"" << " type=\"int\"" << ">" << VpncDebugLevel<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Racoon debuglevel\"" << " type=\"string\"" << ">" << RacoonDebugLevel<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Kvpnc debuglevel\"" << " type=\"int\"" << ">" << KvpncDebugLevel<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Pppd debuglevel\"" << " type=\"bool\"" << ">" << int(PppdDebugLevel)<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Pppd kernel log level\"" << " type=\"int\"" << ">" << int(PppdKernelLogLevel)<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Openvpn debuglevel\"" << " type=\"int\"" << ">" << OpenvpnDebugLevel<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Pptp debuglevel\"" << " type=\"string\"" << ">" << PptpLogLevel<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Ssh debuglevel\"" << " type=\"string\"" << ">" << SshDebugLevel<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Path to vpnc-bin\"" << " type=\"string\"" << ">" << pathToVpnc<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Path to vpnclient\"" << " type=\"string\"" << ">" << pathToCiscoVpnc<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Path to racoon\"" << " type=\"string\"" << ">" << pathToRacoon<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Path to racoonctl\"" << " type=\"string\"" << ">" << pathToRacoonctl<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Path to setkey\"" << " type=\"string\"" << ">" << pathToSetkey<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Path to iptables\"" << " type=\"string\"" << ">" << pathToIptables<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Path to openssl\"" << " type=\"string\"" << ">" << pathToOpenssl<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Path to freeswan\"" << " type=\"string\"" << ">" << pathToIpsec<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Path to pppd\"" << " type=\"string\"" << ">" << pathToPppd<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Path to pptp\"" << " type=\"string\"" << ">" << pathToPptp<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Path to l2tpd\"" << " type=\"string\"" << ">" << pathToL2tpd<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Path to xl2tpd\"" << " type=\"string\"" << ">" << pathToXl2tpd<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Path to openl2tp\"" << " type=\"string\"" << ">" << pathToOpenl2tp<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Path to kill\"" << " type=\"string\"" << ">" << pathToKill<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Path to kill-all\"" << " type=\"string\"" << ">" << pathToKillall<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Path to ping\"" << " type=\"string\"" << ">" << pathToPing<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Path to openvpn\"" << " type=\"string\"" << ">" << pathToOpenvpn<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Path to iputility\"" << " type=\"string\"" << ">" << pathToIp<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Path to ifconfig\"" << " type=\"string\"" << ">" << pathToIfconfig<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Path to route\"" << " type=\"string\"" << ">" << pathToRoute<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Path to netstat\"" << " type=\"string\"" << ">" << pathToNetstat<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Path to pkcs11-tool\"" << " type=\"string\"" << ">" << pathToPkcs11Tool<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Path to vtund\"" << " type=\"string\"" << ">" << pathToVtund<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Path to cisco_cert_mgr\"" << " type=\"string\"" << ">" << pathToCiscoCertMgr<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Path to tail\"" << " type=\"string\"" << ">" << pathToTail<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Path to ssh\"" << " type=\"string\"" << ">" << pathToSsh<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Path to ksshaskpass\"" << " type=\"string\"" << ">" << pathToKsshAskpass<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Path to ssh-askpass-gnome\"" << " type=\"string\"" << ">" << pathToGnomeSshAskpass<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Show Statusbar\"" << " type=\"bool\"" << ">" << int(showStatusBar)<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Try connect timeout\"" << " type=\"int\"" << ">" << tryConnectTimeout<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Last Profile\"" << " type=\"string\"" << ">" << lastProfile<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Write log file\"" << " type=\"bool\"" << ">" << int(writeLogFile)<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Hold generated scripts\"" << " type=\"bool\"" << ">" << int(holdGeneratedScripts)<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Programs in path\"" << " type=\"bool\"" << ">" << int(programsInPath)<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Info logwindow color\"" << " type=\"string\"" << ">" << InfoLogColor.name() << "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Remote logwindow color\"" << " type=\"string\"" << ">" << RemoteLogColor.name() << "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Error logwindow color\"" << " type=\"string\"" << ">" << ErrorLogColor.name() << "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Success logwindow color\"" << " type=\"string\"" << ">" << SuccessLogColor.name() << "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Debug logwindow color\"" << " type=\"string\"" << ">" << DebugLogColor.name() << "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Debug background color\"" << " type=\"string\"" << ">" << DebugBackgroundcolor.name() << "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Use colorized log output\"" << " type=\"bool\"" << ">" << int(useColorizedLogOutput)<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Show interface IP in tooltip\"" << " type=\"bool\"" << ">" << int(showInterfaceIPinTooltip)<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Auto connect profile\"" << " type=\"string\"" << ">" << AutoConnectProfile<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Do auto connect at startup\"" << " type=\"bool\"" << ">" << int(doAutoConnectAtStartup)<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Log viewer font size\"" << " type=\"int\"" << ">" << LogViewerFontSize<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Mainwindow width\"" << " type=\"int\"" << ">" << parent->width()<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Mainwindow height\"" << " type=\"int\"" << ">" << parent->height()<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Mainwindow position x\"" << " type=\"int\"" << ">" << parent->x()<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Mainwindow position y\"" << " type=\"int\"" << ">" << parent->y()<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Openvpn management port\"" << " type=\"int\"" << ">" << int(OpenvpnManagementPort)<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"hideOnCloseInfo\"" << " type=\"bool\"" << ">" << int(hideOnCloseInfo)<< "</option>\n";
|
|
// ExportStream << "\t\t<option name=\"ToolBar Settings\"" << " type=\"bool\"" << ">" << parent->toolBar( "mainToolBar" )<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Use TDEWallet\"" << " type=\"bool\"" << ">" << int(useTDEwallet)<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"FeedbackMailSent\"" << " type=\"bool\"" << ">" << int(feedbackMailSent)<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Do kill l2tpd if still running\"" << " type=\"bool\"" << ">" << int(doKillL2tpdIfStillRunning)<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Do kill xl2tpd if still running\"" << " type=\"bool\"" << ">" << int(doKillXl2tpdIfStillRunning)<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Do kill racoon if still running\"" << " type=\"bool\"" << ">" << int(doKillRacoonIfStillRunning)<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Show connection time in Tooltip\"" << " type=\"bool\"" << ">" << int(showConnectionTimeInTooltip)<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"Enable debug Openvpn\"" << " type=\"bool\"" << ">" << int(enableDebugOpenvpn)<< "</option>\n";
|
|
ExportStream << "\t\t<option name=\"EnableDebugXl2tpdNetwork\"" << " type=\"bool\"" << ">" << int(enableDebugXl2tpdNetwork);
|
|
ExportStream << "\t\t<option name=\"EnableDebugXl2tpdpacket\"" << " type=\"bool\"" << ">" << int(enableDebugXl2tpdpacket);
|
|
ExportStream << "\t\t<option name=\"EnableDebugXl2tpdstate\"" << " type=\"bool\"" << ">" << int(enableDebugXl2tpdstate);
|
|
ExportStream << "\t\t<option name=\"EnableDebugXl2tpdtunnel\"" << " type=\"bool\"" << ">" << int(enableDebugXl2tpdtunnel);
|
|
|
|
ExportStream << "\t</global>" << "\n";
|
|
}
|
|
|
|
|
|
ExportStream << "\t<profiles>" << "\n";
|
|
// VpnAccountData *it;
|
|
if ( !exportAccountList->isEmpty() )
|
|
{
|
|
for ( it = exportAccountList->first(); it; it = exportAccountList->next() )
|
|
{
|
|
// std::cout << "export profile: " << it->getName().ascii() << std::endl;
|
|
ExportStream << "\t\t<profile name=\"" << it->getName() << "\">" << "\n";
|
|
|
|
// normal config
|
|
if ( it->getConnectionType() == VpnAccountData::cisco )
|
|
ExportStream << "\t\t\t<option name=\"Connection type\"" << " type=\"string\"" << ">" << "cisco" << "</option>" << "\n";
|
|
else if ( it->getConnectionType() == VpnAccountData::ciscoorig )
|
|
ExportStream << "\t\t\t<option name=\"Connection type\"" << " type=\"string\"" << ">" << "ciscoorig" << "</option>" << "\n";
|
|
else if ( it->getConnectionType() == VpnAccountData::racoon )
|
|
ExportStream << "\t\t\t<option name=\"Connection type\"" << " type=\"string\"" << ">" << "racoon" << "</option>" << "\n";
|
|
else if ( it->getConnectionType() == VpnAccountData::l2tpd_racoon )
|
|
ExportStream << "\t\t\t<option name=\"Connection type\"" << " type=\"string\"" << ">" << "l2tpd (racoon)" << "</option>" << "\n";
|
|
else if ( it->getConnectionType() == VpnAccountData::freeswan )
|
|
ExportStream << "\t\t\t<option name=\"Connection type\"" << " type=\"string\"" << ">" << "freeswan" << "</option>" << "\n";
|
|
else if ( it->getConnectionType() == VpnAccountData::l2tpd_freeswan )
|
|
ExportStream << "\t\t\t<option name=\"Connection type\"" << " type=\"string\"" << ">" << "l2tpd (openswan)" << "</option>" << "\n";
|
|
else if ( it->getConnectionType() == VpnAccountData::pptp )
|
|
ExportStream << "\t\t\t<option name=\"Connection type\"" << " type=\"string\"" << ">" << "pptp" << "</option>" << "\n";
|
|
else if ( it->getConnectionType() == VpnAccountData::openvpn )
|
|
ExportStream << "\t\t\t<option name=\"Connection type\"" << " type=\"string\"" << ">" << "openvpn" << "</option>" << "\n";
|
|
else
|
|
ExportStream << "\t\t\t<option name=\"Connection type\"" << " type=\"string\"" << ">" << "other" << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"VPN Gateway\"" << " type=\"string\"" << ">" << it->getGateway() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"VPN ID\"" << " type=\"string\"" << ">" << it->getID() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Username\"" << " type=\"string\"" << ">" << it->getUserName() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Save user password\"" << " type=\"bool\"" << ">" << int(it->getSaveUserPassword()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Save PSK\"" << " type=\"bool\"" << ">" << it->getSavePsk() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Save private key password\"" << " type=\"bool\"" << ">" << int(it->getSavePrivateKeyPassword()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Private key\"" << " type=\"string\"" << ">" << it->getPrivateKey() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use advanced settings\"" << " type=\"bool\"" << ">" << int(it->getUseAdvancedSettings()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Application version\"" << " type=\"string\"" << ">" << it->getApplicationVersion() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Local port\"" << " type=\"int\"" << ">" << it->getLocalPort() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Remote port\"" << " type=\"int\"" << ">" << it->getRemotePort() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"NT domain name\"" << " type=\"string\"" << ">" << it->getNtDomainName() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Perfect forward secrety\"" << " type=\"string\"" << ">" << it->getPerfectForwardSecrety() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"IKE group\"" << " type=\"string\"" << ">" << it->getIkeGroup() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use application version\"" << " type=\"bool\"" << ">" << int(it->getUseApplicationVersion()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use global IPSec secret\"" << " type=\"bool\"" << ">" << int(it->getUseGlobalIpsecSecret()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use IKE group\"" << " type=\"bool\"" << ">" << int(it->getUseIkeGroup()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use local port\"" << " type=\"bool\"" << ">" << int(it->getUseLocalPort()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use remote port\"" << " type=\"bool\"" << ">" << int(it->getUseRemotePort()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use NT domain name\"" << " type=\"bool\"" << ">" << int(it->getUseNtDomainName()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use single DES\"" << " type=\"bool\"" << ">" << int(it->getUseSingleDes()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use perfect Forward Secrety\"" << " type=\"bool\"" << ">" << int(it->getUsePerfectForwardSecrety()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Remote net address\"" << " type=\"string\"" << ">" << it->getRemoteNetAddr() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Remote net mask\"" << " type=\"string\"" << ">" << it->getRemoteNetMask() << "</option>" << "\n";
|
|
|
|
ExportStream << "\t\t\t<option name=\"x509 certificate\"" << " type=\"string\"" << ">" << it->getX509Certificate() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Ca certificate\"" << " type=\"string\"" << ">" << it->getCaCertificate() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Network device\"" << " type=\"string\"" << ">" << it->getNetworkDevice() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Cert path\"" << " type=\"string\"" << ">" << it->getCertPath() << "</option>" << "\n";
|
|
if ( it->getAuthType() == VpnAccountData::cert )
|
|
ExportStream << "\t\t\t<option name=\"Auth type\"" << " type=\"string\"" << ">" << "cert" << "</option>" << "\n";
|
|
if ( it->getAuthType() == VpnAccountData::psk )
|
|
ExportStream << "\t\t\t<option name=\"Auth type\"" << " type=\"string\"" << ">" << "psk" << "</option>" << "\n";
|
|
if ( it->getAuthType() == VpnAccountData::hybrid )
|
|
ExportStream << "\t\t\t<option name=\"Auth type\"" << " type=\"string\"" << ">" << "hybrid" << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"do ping ip\"" << " type=\"bool\"" << ">" << int(it->getDoPingIP()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Ping host IP\"" << " type=\"string\"" << ">" << it->getPingHostIP() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use special remote ID\"" << " type=\"bool\"" << ">" << int( it->getUseSpecialRemoteID()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use special local ID\"" << " type=\"bool\"" << ">" << int(it->getUseSpecialLocalID()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Special server certificate\"" << " type=\"string\"" << ">" << it->getSpecialServerCertificate() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use special server certificate\"" << " type=\"bool\"" << ">" << int( it->getUseSpecialServerCertificate()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Special remote ID\"" << " type=\"string\"" << ">" << it->getSpecialRemoteID() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Special local ID\"" << " type=\"string\"" << ">" << it->getSpecialLocalID() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Local ID type\"" << " type=\"string\"" << ">" << it->getLocalIDType() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Remote ID type\"" << " type=\"string\"" << ">" << it->getRemoteIDType() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use UDP-protocol\"" << " type=\"bool\"" << ">" << int( it->getUseUdp()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use UDP-port\"" << " type=\"bool\"" << ">" << int( it->getUseUdpPort()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"local UDP port\"" << " type=\"int\"" << ">" << it->getUdpPort() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"use DNS_UPDATE\"" << " type=\"bool\"" << ">" << int( it->getUseDnsUpdate()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"use DNS-server\"" << " type=\"bool\"" << ">" << int( it->getUseDnsServer()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"DNS server\"" << " type=\"string\"" << ">" << it->getDnsServer() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"refuse 40 bit encryption\"" << " type=\"bool\"" << ">" << int(it->getRefuse40BitEncryption() )<< "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"refuse 128 bit encryption\"" << " type=\"bool\"" << ">" << int( it->getRefuse128BitEncryption()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"require stateless encryption\"" << " type=\"bool\"" << ">" << int(it->getAllowStatefulMode()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"require mppe\"" << " type=\"bool\"" << ">" << int( it->getRequireMppe()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Disable MPPE compression\"" << " type=\"bool\"" << ">" << int( it->getDisableMPPEComp()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Local virtual IP\"" << " type=\"string\"" << ">" << it->getLocalVirtualIP() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Remote virtual IP\"" << " type=\"string\"" << ">" << it->getRemoteVirtualIP() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Pre shared key file\"" << " type=\"string\"" << ">" << it->getPreSharedKeyFile() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Execute command before connect\"" << " type=\"string\"" << ">" << it->getExecuteCmdBeforeConnect() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Execute command after connect\"" << " type=\"string\"" << ">" << it->getExecuteCmdAfterConnect() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Execute command before disconnect\"" << " type=\"string\"" << ">" << it->getExecuteCmdBeforeDisconnect() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Execute command after disconnect\"" << " type=\"string\"" << ">" << it->getExecuteCmdAfterDisconnect() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Command before connect\"" << " type=\"string\"" << ">" << it->getCommandBeforeConnect() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Command after connect\"" << " type=\"string\"" << ">" << it->getCommandAfterConnect() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Command before disconnect\"" << " type=\"string\"" << ">" << it->getCommandBeforeDisconnect() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Command after disconnect\"" << " type=\"string\"" << ">" << it->getCommandAfterDisconnect() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use no BSD compression\"" << " type=\"bool\"" << ">" << int( it->getUseNoBsdComp()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Do not use no IP by default\"" << " type=\"bool\"" << ">" << int(it->getUseNoIpDefault())<< "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use no deflate\"" << " type=\"bool\"" << ">" << int( it->getUseNoDeflate()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Replace default route\"" << " type=\"bool\"" << ">" << int(it->getReplaceDefaultRoute()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use own MTU\"" << " type=\"bool\"" << ">" << int(it->getUseMtu()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use own MRU\"" << " type=\"bool\"" << ">" << int(it->getUseMru()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"MTU for pppd\"" << " type=\"int\"" << ">" << it->getMtu() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"MRU for pppd\"" << " type=\"int\"" << ">" << it->getMru() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use virtual IP\"" << " type=\"bool\"" << ">" << int( it->getUseVirtualIP()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Virtual IP\"" << " type=\"string\"" << ">" << it->getVirtualIP() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"PSK is in file\"" << " type=\"bool\"" << ">" << int( it->getPskIsInFile()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use additional network routes\"" << " type=\"bool\"" << ">" << int(it->getUseAdditionalNetworkRoutes()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Hash algorithm\"" << " type=\"string\"" << ">" << it->getHashAlgo() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Encryption algorithm\"" << " type=\"string\"" << ">" << it->getEncryptionAlgorithm() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Authentication algorithm\"" << " type=\"string\"" << ">" << it->getAuthenticationAlgorithm() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Tunnel device type\"" << " type=\"string\"" << ">" << it->getTunnelDeviceType() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use userdefined port\"" << " type=\"bool\"" << ">" << int( it->getUseUserdefinedPort()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Userdefined port\"" << " type=\"int\"" << ">" << it->getUserdefinedPort() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"NS cert type\"" << " type=\"string\"" << ">" << it->getNsCertType() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use NS cert type\"" << " type=\"bool\"" << ">" << int(it->getUseNsCertType() )<< "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use connection status check\"" << " type=\"bool\"" << ">" << int( it->getUseConnectionStatusCheck()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Connection check success count\"" << " type=\"int\"" << ">" << it->getConnectionStatusCheckSuccessCount() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Connection check status interval\"" << " type=\"int\"" << ">" << it->getConnectionStatusInterval() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Do reconnect after connection lost\"" << " type=\"bool\"" << ">" << int(it->getDoReconnectAfterConnectionLost())<< "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Disable LZO compression\"" << " type=\"bool\"" << ">" << int( it->getDisableLzoCompression())<< "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"AuthWithUsernameAndPassword\"" << " type=\"bool\"" << ">" << int( it->getAuthWithUsernameAndPassword()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"AllowEmptyGroupPassword\"" << " type=\"bool\"" << ">" << int( it->getAllowEmptyGroupPassword()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use userdefinied cipher\"" << " type=\"bool\"" << ">" << int(it->getUseUserdefiniedCipher()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Userdefinied cipher\"" << " type=\"string\"" << ">" << it->getUserdefiniedCipher() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use redirect gateway\"" << " type=\"bool\"" << ">" << int( it->getUseRedirectGateway()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use TLS auth\"" << " type=\"bool\"" << ">" << int(it->getUseTlsAuth()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"TLS auth file\"" << " type=\"string\"" << ">" << it->getTlsAuthFile() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use HTTP proxy\"" << " type=\"bool\"" << ">" << int( it->getUseHttpProxy()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"HTTP proxy host\"" << " type=\"string\"" << ">" << it->getHttpProxy() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"HTTP proxy port\"" << " type=\"int\"" << ">" << it->getHttpProxyPort() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"HTTP proxy timeout\"" << " type=\"int\"" << ">" << it->getHttpProxyTimeout() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Dont save username\"" << " type=\"bool\"" << ">" << int( it->getDontSaveUsername()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use mode config\"" << " type=\"bool\"" << ">" << int(it->getUseModeConfig()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Exchange mode\"" << " type=\"string\"" << ">" << it->getExchangeMode() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use delay at reconnect\"" << " type=\"bool\"" << ">" << int( it->getUseReconnectDelay()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Reconnect delay\"" << " type=\"int\"" << ">" << it->getReconnectDelay() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use TLS host\"" << " type=\"bool\"" << ">" << int(it->getUseTlsRemoteHost()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"TLS remote host\"" << " type=\"string\"" << ">" << it->getTlsRemoteHost() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Disable opportunistic encryption\"" << " type=\"bool\"" << ">" << int( it->getDisableOpportunisticEncryption() )<< "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Right next hop\"" << " type=\"string\"" << ">" << it->getRightNextHop() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Left next hop\"" << " type=\"string\"" << ">" << it->getLeftNextHop() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use userdefinied packet size for fragmentation\"" << " type=\"bool\"" << ">" << it->getUseFragment() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use userdef packet size\"" << " type=\"bool\"" << ">" << int( it->getUseMssfix()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Fragment\"" << " type=\"int\"" << ">" << it->getFragment() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"PeerTimeout\"" << " type=\"int\"" << ">" << it->getPeerTimeout() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Disable CCP\"" << " type=\"bool\"" << ">" << int( it->getDisableCcp()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use smartcard\"" << " type=\"bool\"" << ">" <<int( it->getUseSmartcard()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use Xauth interactive\"" << " type=\"bool\"" << ">" << it->getUseXauthInteractive() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use HTTP Proxy Authentication\"" << " type=\"bool\"" << ">" << int( it->getUseHttpProxyAuth() )<< "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"HTTP Proxy Authtype\"" << " type=\"string\"" << ">" << it->getHttpProxyAuthType() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use HTTP Proxy Auth user\"" << " type=\"string\"" << ">" << it->getHttpProxyUser() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use HTTP Proxy Auth pass\"" << " type=\"string\"" << ">" << it->getHttpProxyPass() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use only CA cert and user auth\"" << " type=\"bool\"" << ">" <<int( it->getUseOnlyCaCertAndUserAuth()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use mail address as identifier\"" << " type=\"bool\"" << ">" <<int( it->getUseMailAddressAsIdentifier()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use right next hop\"" << " type=\"bool\"" << ">" << int( it->getUseRightNextHop()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use left next hop\"" << " type=\"bool\"" << ">" << int(it->getUseLeftNextHop())<< "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Pkcs11 providers\"" << " type=\"string\"" << ">" << it->getPkcs11Providers() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Pkcs11 slot type\"" << " type=\"string\"" << ">" << it->getPkcs11SlotType() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Pkcs11 slot\"" << " type=\"string\"" << ">" << it->getPkcs11Slot() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Pkcs11 id type\"" << " type=\"string\"" << ">" << it->getPkcs11IdType() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Pkcs11 id\"" << " type=\"string\"" << ">" << it->getPkcs11Id() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Pkcs11 sign mode\"" << " type=\"string\"" << ">" << it->getPkcs11SignMode() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use Pkcs11 providers\"" << " type=\"bool\"" << ">" << int( it->getUsePkcs11Providers()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Allow empty private key password\"" << " type=\"bool\"" << ">" << int( it->getAllowEmptyPrivateKeyPassword())<< "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Allow ip address change of peer\"" << " type=\"bool\"" << ">" << int(it->getAllowIpAddressChangeOfPeer())<< "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Auth method\"" << " type=\"string\"" << ">" << it->getAuthMethod()<< "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Command after connect delay time\"" << " type=\"string\"" << ">" << it->getCommandAfterConnectDelayTime()<< "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use search domain in resolv conf\"" << " type=\"bool\"" << ">" <<int( it->getUseSearchDomainInResolvConf())<< "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use domain in resolv conf\"" << " type=\"bool\"" << ">" <<int( it->getUseDomainInResolvConf())<< "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Search domain in resolv conf\"" << " type=\"string\"" << ">" <<it->getSearchDomainInResolvConf()<< "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Domain in resolv conf\"" << " type=\"string\"" << ">" <<it->getDomainInResolvConf()<< "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Authentication direction\"" << " type=\"string\"" << ">" << it->getAuthenticationDirection()<< "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"CiscoNatMode\"" << " type=\"string\"" << ">" << it->getCiscoNatMode()<< "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"IPSec ESP\"" << " type=\"string\"" << ">" << it->getIpsecEsp()<< "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"IPSec IKE\"" << " type=\"string\"" << ">" << it->getIpsecIke()<< "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Vtun profile\"" << " type=\"string\"" << ">" << it->getVtunProfile()<< "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Disable data encryption\"" << " type=\"bool\"" << ">" <<int( it->getDisableDataEncryption())<< "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use authentication algorithm\"" << " type=\"bool\"" << ">" <<int( it->getUseAuthenticationAlgorithm())<< "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Fix path mtu discovery problem\"" << " type=\"bool\"" << ">" <<int( it->getFixPathMtuDiscoveryProblem()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use remote network\"" << " type=\"bool\"" << ">" <<int( it->getUseRemoteNetwork()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Ipsec vpn mode\"" << " type=\"string\"" << ">" <<it->getIpsecVpnMode() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"DisableHeaderCompression\"" << " type=\"bool\"" << ">" <<int( it->getDisableHeaderCompression()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"DisableMagicNumberNegotiation\"" << " type=\"bool\"" << ">" <<int( it->getDisableMagicNumberNegotiation()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"DisableIpx\"" << " type=\"bool\"" << ">" <<int( it->getDisableIpx()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Disable protocol field compression\"" << " type=\"bool\"" << ">" <<int( it->getDisableProtocolFieldCompression()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Disable adress control compression\"" << " type=\"bool\"" << ">" <<int( it->getDisableAdressControlCompression()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use custom ike\"" << " type=\"bool\"" << ">" <<int(it->getUseCustomIke()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use custom esp\"" << " type=\"bool\"" << ">" <<int(it->getUseCustomEsp()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Verify ca cert\"" << " type=\"bool\"" << ">" <<int(it->getVerifyCaCert()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use DPD idle timeout\"" << " type=\"bool\"" << ">" <<int(it->getUseDpdIdleTimeout()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"DPD idle timeout\"" << " type=\"int\"" << ">" << it->getDpdIdleTimeout() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Hide group password in accountdata dialog\"" << " type=\"bool\"" << ">" <<int(it->getHideGroupPasswordInAccountDataDialog()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"MaxConnectTries\"" << " type=\"int\"" << ">" << it->getMaxConnectTries() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"L2tpDaemon\"" << " type=\"int\"" << ">" << it->getL2tpDaemon() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"UseLeftSourceIp\"" << " type=\"bool\"" << ">" <<int(it->getUseLeftSourceIp()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"UseRightSourceIp\"" << " type=\"bool\"" << ">" <<int(it->getUseRightSourceIp()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"LeftSourceIp\"" << " type=\"string\"" << ">" << it->getLeftSourceIp() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"RightSourceIp\"" << " type=\"string\"" << ">" << it->getRightSourceIp() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Use virtual subnets\"" << " type=\"bool\"" << ">" <<int(it->getUseVirtualSubnetworks()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"Virtual subnets\"" << " type=\"string\"" << ">" <<it->getVirtualSubnetworks() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"DisablePushFromServer\"" << " type=\"bool\"" << ">" <<int(it->getDisablePushFromServer()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"DisableBind\"" << " type=\"bool\"" << ">" <<int(it->getDisableBind()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"UseRenegSec\"" << " type=\"bool\"" << ">" <<int(it->getUseRenegSec()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"RenegSec\"" << " type=\"int\"" << ">" << it->getRenegSec() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"UseTunnelPing\"" << " type=\"bool\"" << ">" <<int(it->getUseTunnelPing()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"TunnelPing\"" << " type=\"int\"" << ">" << it->getTunnelPing() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"UseTunnelPingRestart\"" << " type=\"bool\"" << ">" <<int( it->getUseTunnelPingRestart()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"TunnelPingRestart\"" << " type=\"int\"" << ">" << it->getTunnelPingRestart() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"RequireEap\"" << " type=\"bool\"" << ">" <<int( it->getRequireEap()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"UseSshConfigRemoteScript\"" << " type=\"bool\"" << ">" <<int( it->getUseSshConfigRemoteScript()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"SshConfigRemoteScript\"" << " type=\"string\"" << ">" << it->getSshConfigRemoteScript() << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"AskUserPasswordOnEachConnect\"" << " type=\"bool\"" << ">" <<int( it->getAskUserPasswordOnEachConnect()) << "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"UseCiscoCertStore\"" << " type=\"bool\"" << ">" <<int( it->getUseCiscoCertStore())<< "</option>" << "\n";
|
|
ExportStream << "\t\t\t<option name=\"UseNat\"" << " type=\"bool\"" << ">" <<int( it->getUseNat())<< "</option>" << "\n";
|
|
|
|
ExportStream << "\t\t</profile>" << "\n";
|
|
exportCount++;
|
|
}
|
|
|
|
}
|
|
ExportStream << "\t</profiles>" << "\n";
|
|
ExportStream << "</kvpnc>" << "\n";
|
|
exportfile.close();
|
|
}
|
|
else
|
|
{
|
|
KMessageBox::error ( 0, i18n ( "Creating of \"%1\" has been failed!" ).arg ( filename ) );
|
|
return false;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
KMessageBox::information ( 0, i18n ( "Export canceled." ) );
|
|
return false;
|
|
}
|
|
TQString msg="";
|
|
if (exportCount > 0 && exportGlobal==true)
|
|
msg = i18n("Export was successful. %1 profiles and global settings are exported.").arg(TQString::number(exportCount));
|
|
if (exportCount > 0 && exportGlobal==false)
|
|
msg = i18n("Export was successful. %1 profiles are exported.").arg(TQString::number(exportCount));
|
|
if (exportCount < 1 && exportGlobal==true)
|
|
msg = i18n("Export was successful. Global settings are exported.");
|
|
KMessageBox::information ( 0, msg,i18n("Export success") );
|
|
return true;
|
|
}
|
|
|
|
bool KVpncConfig::importKvpncConfig(TQString filename, TQString& RetName, bool& openProfileManager)
|
|
{
|
|
TQFile importfile (filename);
|
|
if (!importfile.exists())
|
|
{
|
|
KMessageBox::error ( 0, i18n ( "Reading of \"%1\" has been failed!" ).arg ( filename ) );
|
|
return false;
|
|
}
|
|
TQString kvpncexportversion="";
|
|
|
|
TQString pathToVpnc;
|
|
TQString pathToCiscoVpnc;
|
|
TQString pathToRacoon;
|
|
TQString pathToRacoonctl;
|
|
TQString pathToSetkey;
|
|
TQString pathToIptables;
|
|
TQString pathToOpenssl;
|
|
TQString pathToIpsec;
|
|
TQString pathToPppd;
|
|
TQString pathToPptp;
|
|
TQString pathToL2tpd;
|
|
TQString pathToXl2tpd;
|
|
TQString pathToOpenl2tp;
|
|
TQString pathToKill;
|
|
TQString pathToKillall;
|
|
TQString pathToPing;
|
|
TQString pathToOpenvpn;
|
|
TQString pathToIp;
|
|
TQString pathToIfconfig;
|
|
TQString pathToRoute;
|
|
TQString pathToNetstat;
|
|
TQString pathToPkcs11Tool;
|
|
TQString pathToVtund;
|
|
TQString pathToCiscoCertMgr;
|
|
TQString pathToTail;
|
|
TQString pathToSsh;
|
|
TQString pathToKsshAskpass;
|
|
TQString pathToGnomeSshAskpass;
|
|
TQString AutoConnectProfile;
|
|
TQString RacoonDebugLevel;
|
|
TQString Vpnc_pid_file;
|
|
TQString Pppd_pid_file;
|
|
TQString lastProfile;
|
|
TQString logfileName;
|
|
|
|
TQString TmpPassword; //< from enter password dialog
|
|
TQString TmpGroupPassword; //< from enter password dialog
|
|
TQString TmpUsername; //< from enter password dialog
|
|
TQString TmpPrivKeyPassStr;
|
|
TQString TmpGatewayIP;
|
|
TQString TmpXauthInterPasscode; //< from Xauth interactive passcode dialog
|
|
TQString TmpPrivateKeyPass;
|
|
TQString TmpHttpProxyPassword;
|
|
|
|
bool minimizeAfterConnect=true;
|
|
bool showDebugConsole=true;
|
|
bool writeLogFile=true;
|
|
bool useDefaultPaths=true;
|
|
bool useSilentQuit=false;
|
|
bool holdGeneratedScripts=true;
|
|
bool programsInPath=true;
|
|
bool enableDebugPppd=false;
|
|
bool enableDebugPptpd=false;
|
|
bool enableDebugL2tpd=false;
|
|
bool enableDebugXl2tpd=false;
|
|
bool enableDebugOpenl2tp=false;
|
|
bool enableFreeswanVerbose=false;
|
|
bool enableDebugOpenvpn=false;
|
|
bool useColorizedLogOutput=true;
|
|
bool showInterfaceIPinTooltip=true;
|
|
bool dontQuitOnCloseEvent=true;
|
|
bool doAutoConnectAtStartup=false;
|
|
bool useTDEwallet=true;
|
|
bool showStatusBar=true;
|
|
bool showToolBar=true;
|
|
bool hideMainWindow=false;
|
|
bool PppdDebugLevel=false;
|
|
bool firstUseOfTDEwallet=false;
|
|
bool shutdownIsCalled=false;
|
|
bool skipTDEwalletStoring=false;
|
|
bool hideOnCloseInfo=false;
|
|
bool feedbackMailSent=false;
|
|
bool doKillL2tpdIfStillRunning=false;
|
|
bool doKillXl2tpdIfStillRunning=false;
|
|
bool doKillRacoonIfStillRunning=false;
|
|
bool showConnectionTimeInTooltip=false;
|
|
|
|
int VpncDebugLevel=0;
|
|
int KvpncDebugLevel=1;
|
|
int OpenvpnDebugLevel=0;
|
|
int PptpLogLevel=0;
|
|
int SshDebugLevel=0;
|
|
int PppdKernelLogLevel=0;
|
|
int LogViewerFontSize=10;
|
|
int mainwindow_pos_x=10;
|
|
int mainwindow_pos_y=10;
|
|
int mainwindow_height=600;
|
|
int mainwindow_width=800;
|
|
int connectSleepDelay=10;
|
|
int connectSleepRetry=3;
|
|
int tryConnectTimeout=30;
|
|
int connectionStartTime=0;
|
|
int runningCheckCounter=0;
|
|
int runningCheckTimeout=0;
|
|
int OpenvpnManagementPort=2222;
|
|
TQPtrList<VpnAccountData> *ImportedAccountList;
|
|
|
|
TQColor InfoLogColor;
|
|
TQColor RemoteLogColor;
|
|
TQColor ErrorLogColor;
|
|
TQColor SuccessLogColor;
|
|
TQColor DebugLogColor;
|
|
TQColor DebugBackgroundcolor;
|
|
|
|
TQPoint pos;
|
|
TQPoint WindowPos;
|
|
TQSize WindowSize;
|
|
|
|
bool importGlobal=false;
|
|
int importCount=0;
|
|
|
|
TQDomDocument doc( "kvpncsettingsdoc" );
|
|
if( importfile.open(IO_ReadOnly))
|
|
{
|
|
TQApplication::setOverrideCursor( TQCursor(TQt::WaitCursor) );
|
|
|
|
if ( !doc.setContent( &importfile ) ) {
|
|
importfile.close();
|
|
KMessageBox::error ( 0, i18n ( "Reading of \"%1\" has been failed!" ).arg ( filename ) );
|
|
appendLogEntry (i18n ( "Reading of \"%1\" has been failed!" ).arg ( filename ), error);
|
|
TQApplication::restoreOverrideCursor();
|
|
return false;
|
|
}
|
|
importfile.close();
|
|
|
|
// print out the element names of all elements that are direct children
|
|
// of the outermost element.
|
|
TQDomElement docElem = doc.documentElement();
|
|
|
|
TQDomNode n = docElem.firstChild();
|
|
if (KvpncDebugLevel > 5)
|
|
std::cout << "dom doc:" << std::endl;
|
|
while( !n.isNull() )
|
|
{
|
|
if (n.toElement().tagName() == "version")
|
|
{
|
|
if (KvpncDebugLevel > 5)
|
|
std::cout << "version tag found." << std::endl;
|
|
TQDomNodeList vsubnodes = n.toElement().childNodes();
|
|
for (int i=0;i<=(int)vsubnodes.count();i++)
|
|
{
|
|
TQDomNode n1 = vsubnodes.item(i);
|
|
if (n1.toElement().tagName() == "app")
|
|
{
|
|
if (KvpncDebugLevel > 5)
|
|
std::cout << " doc was created from kvpnc ver " << n1.toElement().text() << std::endl;
|
|
}
|
|
if (n1.toElement().tagName() == "exportversion")
|
|
{
|
|
kvpncexportversion = n1.toElement().text();
|
|
if (KvpncDebugLevel > 5)
|
|
std::cout << " doc was created from kvpnc with exportver " << n1.toElement().text() << std::endl;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (n.toElement().tagName() == "global")
|
|
{
|
|
if (KvpncDebugLevel > 5)
|
|
std::cout << "gobal tag found." << std::endl;
|
|
TQDomNodeList vsubnodes = n.toElement().childNodes();
|
|
for (int i=0;i<=(int)vsubnodes.count();i++)
|
|
{
|
|
TQDomNode n1 = vsubnodes.item(i);
|
|
if (n1.toElement().tagName() != "")
|
|
{
|
|
if (KvpncDebugLevel > 5)
|
|
std::cout << " => option: " << ", value: " << n1.toElement().text() << std::endl;
|
|
}
|
|
if ( n1.toElement().tagName() == "Minimize after connect" ) { minimizeAfterConnect = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "Hide on startup" ) { hideMainWindow = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "Use silent quit" ) { useSilentQuit = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "Dont quit on CloseEvent" ) { dontQuitOnCloseEvent = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "Enable pppd debug" ) { enableDebugPppd = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "Enable pptpd debug" ) { enableDebugPptpd = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "Enable l2tpd debug" ) { enableDebugL2tpd = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "Enable xl2tpd debug" ) { enableDebugXl2tpd = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "Enable openl2tp debug" ) { enableDebugOpenl2tp = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "Enable FreeSWAN verbose" ) { enableFreeswanVerbose = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "Pluto Debug" ) { PlutoDebug = TQStringList::split(' ', n1.toElement().text()); }
|
|
else if ( n1.toElement().tagName() == "Klips Debug" ) { KlipsDebug = TQStringList::split(' ', n1.toElement().text()); }
|
|
else if ( n1.toElement().tagName() == "Show debugconsole" ) { showDebugConsole = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "Pid file for vpnc " ) { Vpnc_pid_file = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "Vpnc debuglevel" ) { VpncDebugLevel = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "Racoon debuglevel" ) { RacoonDebugLevel = n1.toElement().text(); }
|
|
else if ( n1.toElement().tagName() == "Kvpnc debuglevel" ) { KvpncDebugLevel = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "Pppd debuglevel" ) { PppdDebugLevel = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "Pppd kernel log level" ) { PppdKernelLogLevel = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "Openvpn debuglevel" ) { OpenvpnDebugLevel = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "Pptp debuglevel" ) { PptpLogLevel = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "Ssh debuglevel" ) { SshDebugLevel = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "Path to vpnc-bin" ) { pathToVpnc = n1.toElement().text(); }
|
|
else if ( n1.toElement().tagName() == "Path to vpnclient" ) { pathToCiscoVpnc = n1.toElement().text(); }
|
|
else if ( n1.toElement().tagName() == "Path to racoon" ) { pathToRacoon = n1.toElement().text(); }
|
|
else if ( n1.toElement().tagName() == "Path to racoonctl" ) { pathToRacoonctl = n1.toElement().text(); }
|
|
else if ( n1.toElement().tagName() == "Path to setkey" ) { pathToSetkey = n1.toElement().text(); }
|
|
else if ( n1.toElement().tagName() == "Path to iptables" ) { pathToIptables = n1.toElement().text(); }
|
|
else if ( n1.toElement().tagName() == "Path to openssl" ) { pathToOpenssl = n1.toElement().text(); }
|
|
else if ( n1.toElement().tagName() == "Path to freeswan" ) { pathToIpsec = n1.toElement().text(); }
|
|
else if ( n1.toElement().tagName() == "Path to pppd" ) { pathToPppd = n1.toElement().text(); }
|
|
else if ( n1.toElement().tagName() == "Path to pptp" ) { pathToPptp = n1.toElement().text(); }
|
|
else if ( n1.toElement().tagName() == "Path to l2tpd" ) { pathToL2tpd = n1.toElement().text(); }
|
|
else if ( n1.toElement().tagName() == "Path to xl2tpd" ) { pathToXl2tpd = n1.toElement().text(); }
|
|
else if ( n1.toElement().tagName() == "Path to openl2tp" ) { pathToOpenl2tp = n1.toElement().text(); }
|
|
else if ( n1.toElement().tagName() == "Path to kill" ) { pathToKill = n1.toElement().text(); }
|
|
else if ( n1.toElement().tagName() == "Path to kill-all" ) { pathToKillall = n1.toElement().text(); }
|
|
else if ( n1.toElement().tagName() == "Path to ping" ) { pathToPing = n1.toElement().text(); }
|
|
else if ( n1.toElement().tagName() == "Path to openvpn" ) { pathToOpenvpn = n1.toElement().text(); }
|
|
else if ( n1.toElement().tagName() == "Path to iputility" ) { pathToIp = n1.toElement().text(); }
|
|
else if ( n1.toElement().tagName() == "Path to ifconfig" ) { pathToIfconfig = n1.toElement().text(); }
|
|
else if ( n1.toElement().tagName() == "Path to route" ) { pathToRoute = n1.toElement().text(); }
|
|
else if ( n1.toElement().tagName() == "Path to netstat" ) { pathToNetstat = n1.toElement().text(); }
|
|
else if ( n1.toElement().tagName() == "Path to pkcs11-tool" ) { pathToPkcs11Tool = n1.toElement().text(); }
|
|
else if ( n1.toElement().tagName() == "Path to vtund" ) { pathToVtund = n1.toElement().text(); }
|
|
else if ( n1.toElement().tagName() == "Path to cisco_cert_mgr" ) { pathToCiscoCertMgr = n1.toElement().text(); }
|
|
else if ( n1.toElement().tagName() == "Path to tail" ) { pathToTail = n1.toElement().text(); }
|
|
else if ( n1.toElement().tagName() == "Path to ssh" ) { pathToSsh = n1.toElement().text(); }
|
|
else if ( n1.toElement().tagName() == "Path to ksshaskpass" ) { pathToKsshAskpass = n1.toElement().text(); }
|
|
else if ( n1.toElement().tagName() == "Path to ssh-askpass-gnome" ) { pathToGnomeSshAskpass = n1.toElement().text(); }
|
|
else if ( n1.toElement().tagName() == "Show Statusbar" ) { showStatusBar = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "Try connect timeout" ) { tryConnectTimeout = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "Last Profile" ) { lastProfile = n1.toElement().text(); }
|
|
else if ( n1.toElement().tagName() == "Write log file" ) { writeLogFile = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "Hold generated scripts" ) { holdGeneratedScripts = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "Programs in path" ) { programsInPath = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "Info logwindow color" ) { InfoLogColor.name() = n1.toElement().text(); }
|
|
else if ( n1.toElement().tagName() == "Remote logwindow color" ) { RemoteLogColor.name() = n1.toElement().text(); }
|
|
else if ( n1.toElement().tagName() == "Error logwindow color" ) { ErrorLogColor.name() = n1.toElement().text(); }
|
|
else if ( n1.toElement().tagName() == "Success logwindow color" ) { SuccessLogColor.name() = n1.toElement().text(); }
|
|
else if ( n1.toElement().tagName() == "Debug logwindow color" ) { DebugLogColor.name() = n1.toElement().text(); }
|
|
else if ( n1.toElement().tagName() == "Debug background color" ) { DebugBackgroundcolor.name() = n1.toElement().text(); }
|
|
else if ( n1.toElement().tagName() == "Use colorized log output" ) { useColorizedLogOutput = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "Show interface IP in tooltip" ) { showInterfaceIPinTooltip = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "Auto connect profile" ) { AutoConnectProfile = n1.toElement().text(); }
|
|
else if ( n1.toElement().tagName() == "Do auto connect at startup" ) { doAutoConnectAtStartup = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "Log viewer font size" ) { LogViewerFontSize = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "Mainwindow width" ) { mainwindow_width = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "Mainwindow height" ) { mainwindow_height = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "Mainwindow position x" ) { mainwindow_pos_x = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "Mainwindow position y" ) { mainwindow_pos_y = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "Openvpn management port" ) { OpenvpnManagementPort = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "hideOnCloseInfo" ) { hideOnCloseInfo = n1.toElement().text().toInt(); }
|
|
// else if (n1.toElement().tagName() == "ToolBar Settings") { parent->toolBar( "mainToolBar" ) = n1.toElement().text(); }
|
|
else if ( n1.toElement().tagName() == "Use TDEWallet" ) { useTDEwallet = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "FeedbackMailSent" ) { feedbackMailSent = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "Do kill l2tpd if still running" ) { doKillL2tpdIfStillRunning = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "Do kill xl2tpd if still running" ) { doKillXl2tpdIfStillRunning = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "Do kill racoon if still running" ) { doKillRacoonIfStillRunning = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "Show connection time in Tooltip" ) { showConnectionTimeInTooltip = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "Enable debug Openvpn" ) { enableDebugOpenvpn = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "EnableDebugXl2tpdNetwork") { enableDebugXl2tpdNetwork = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "EnableDebugXl2tpdpacket" ) { enableDebugXl2tpdpacket = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "EnableDebugXl2tpdstate" ) { enableDebugXl2tpdstate = n1.toElement().text().toInt(); }
|
|
else if ( n1.toElement().tagName() == "EnableDebugXl2tpdtunnel") { enableDebugXl2tpdtunnel = n1.toElement().text().toInt(); }
|
|
}
|
|
}
|
|
|
|
if (n.toElement().tagName() == "profiles")
|
|
{
|
|
if (KvpncDebugLevel > 5)
|
|
std::cout << "profiles tag found." << std::endl;
|
|
|
|
ImportedAccountList = new TQPtrList<VpnAccountData>();
|
|
ImportedAccountList->setAutoDelete( TRUE ); // the list owns the objects
|
|
|
|
TQDomNodeList profiles_subnodes = n.toElement().childNodes();
|
|
for (int i=0;i<=(int)profiles_subnodes.count();i++)
|
|
{
|
|
TQDomNode n1 = profiles_subnodes.item(i);
|
|
if (n1.toElement().attribute("name") != "")
|
|
{
|
|
if (KvpncDebugLevel > 5)
|
|
std::cout << "profile: " << n1.toElement().attribute("name") << std::endl;
|
|
TQString name = n1.toElement().attribute("name");
|
|
VpnAccountData *data = new VpnAccountData( VpnAccountData::cisco, name); // cisco is a dummy here, it will be set later
|
|
data->setDescription(i18n("import from ")+filename);
|
|
|
|
TQDomNodeList profile_subnodes = n1.toElement().childNodes();
|
|
for (int j=0;j<=(int)profile_subnodes.count();j++)
|
|
{
|
|
TQDomNode n2 = profile_subnodes.item(j);
|
|
if (n2.toElement().attribute("name") != "")
|
|
{
|
|
TQString elementname= n2.toElement().attribute("name");
|
|
TQString elementvalue = n2.toElement().text();
|
|
if (KvpncDebugLevel > 5)
|
|
std::cout << " => option: " << elementname << ", value: " << elementvalue << std::endl;
|
|
// normal config
|
|
if (elementname == "Connection type")
|
|
{
|
|
TQString type = elementvalue;
|
|
VpnAccountData::ConnectionType ConnType = VpnAccountData::ConnectionType( VpnAccountData::cisco );
|
|
if ( type == "cisco" )
|
|
ConnType = VpnAccountData::cisco;
|
|
else if ( type == "ciscoorig" )
|
|
ConnType = VpnAccountData::ciscoorig;
|
|
else if ( type == "racoon" )
|
|
ConnType = VpnAccountData::racoon;
|
|
else if ( type == "l2tpd (racoon)" )
|
|
ConnType = VpnAccountData::l2tpd_racoon;
|
|
else if ( type == "freeswan" )
|
|
ConnType = VpnAccountData::freeswan;
|
|
else if ( type == "l2tpd (openswan)" )
|
|
ConnType = VpnAccountData::l2tpd_freeswan;
|
|
else if ( type == "pptp" )
|
|
ConnType = VpnAccountData::pptp;
|
|
else if ( type == "openvpn" )
|
|
ConnType = VpnAccountData::openvpn;
|
|
else if ( type == "vtun" )
|
|
ConnType = VpnAccountData::vtun;
|
|
else if ( type == "ssh" )
|
|
ConnType = VpnAccountData::ssh;
|
|
|
|
else
|
|
ConnType = VpnAccountData::other;
|
|
data->setConnectionType(ConnType);
|
|
// std::cout << " ==> type: " << type << std::endl;
|
|
}
|
|
|
|
else if (elementname == "VPN Gateway") { data->setGateway(elementvalue); }
|
|
else if (elementname == "VPN ID") { data->setID(elementvalue); }
|
|
else if (elementname == "Username") { data->setUserName(elementvalue); }
|
|
|
|
else if (elementname == "Save user password") { data->setSaveUserPassword(elementvalue.toInt()); }
|
|
else if (elementname == "Save PSK") { data->setSavePsk(elementvalue.toInt()); }
|
|
else if (elementname == "Save private key password") { data->setSavePrivateKeyPassword(elementvalue.toInt()); }
|
|
else if (elementname == "Private key") { data->setPrivateKey(elementvalue); }
|
|
else if (elementname == "Use advanced settings") { data->setUseAdvancedSettings(elementvalue.toInt()); }
|
|
else if (elementname == "Application version") { data->setApplicationVersion(elementvalue); }
|
|
else if (elementname == "Local port") { data->setLocalPort(elementvalue.toInt()); }
|
|
else if (elementname == "Remote port") { data->setRemotePort(elementvalue.toInt()); }
|
|
else if (elementname == "NT domain name") { data->setNtDomainName(elementvalue); }
|
|
else if (elementname == "Perfect forward secrety") { data->setPerfectForwardSecrety(elementvalue); }
|
|
else if (elementname == "IKE group") { data->setIkeGroup(elementvalue); }
|
|
|
|
else if (elementname == "Use application version") { data->setUseApplicationVersion(elementvalue.toInt()); }
|
|
else if (elementname == "Use global IPSec secret") { data->setUseGlobalIpsecSecret(elementvalue.toInt()); }
|
|
else if (elementname == "Use IKE group") { data->setUseIkeGroup(elementvalue.toInt()); }
|
|
else if (elementname == "Use local port") { data->setUseLocalPort(elementvalue.toInt()); }
|
|
else if (elementname == "Use remote port") { data->setUseRemotePort(elementvalue.toInt()); }
|
|
else if (elementname == "Use NT domain name") { data->setUseNtDomainName(elementvalue.toInt()); }
|
|
else if (elementname == "Use single DES") { data->setUseSingleDes(elementvalue.toInt()); }
|
|
else if (elementname == "Use perfect Forward Secrety") { data->setUsePerfectForwardSecrety(elementvalue.toInt()); }
|
|
else if (elementname == "Remote net address") { data->setRemoteNetAddr(elementvalue); }
|
|
else if (elementname == "Remote net mask") { data->setRemoteNetMask(elementvalue); }
|
|
|
|
else if (elementname == "x509 certificate") { data->setX509Certificate(elementvalue); }
|
|
else if (elementname == "Ca certificate") { data->setCaCertificate(elementvalue); }
|
|
else if (elementname == "Network device") { data->setNetworkDevice(elementvalue); }
|
|
else if (elementname == "Cert path") { data->setCertPath(elementvalue); }
|
|
|
|
else if (elementname == "Auth type")
|
|
{
|
|
TQString Authtype = elementvalue;
|
|
if (Authtype == "cert")
|
|
data->setAuthType(VpnAccountData::cert);
|
|
else if (Authtype == "psk")
|
|
data->setAuthType(VpnAccountData::psk);
|
|
else if (Authtype == "hybrid")
|
|
data->setAuthType(VpnAccountData::hybrid);
|
|
else
|
|
data->setAuthType( VpnAccountData::unknownauth);
|
|
|
|
if ((data->getConnectionType() == VpnAccountData::pptp || data->getConnectionType() == VpnAccountData::openvpn ) && (Authtype != "cert" && Authtype == "psk"))
|
|
data->setAuthType(VpnAccountData::cert);
|
|
|
|
}
|
|
else if (elementname == "do ping ip") { data->setDoPingIP(elementvalue.toInt()); }
|
|
else if (elementname == "Ping host IP") { data->setPingHostIP(elementvalue); }
|
|
|
|
else if (elementname == "Special server certificate") { data->setSpecialServerCertificate(elementvalue); }
|
|
else if (elementname == "Use special server certificate") { data->setUseSpecialServerCertificate(elementvalue.toInt()); }
|
|
else if (elementname == "Special remote ID") { data->setSpecialRemoteID(elementvalue); }
|
|
else if (elementname == "Special local ID") { data->setSpecialLocalID(elementvalue); }
|
|
else if (elementname == "Local ID type") { data->setLocalIDType(elementvalue); }
|
|
else if (elementname == "Remote ID type") { data->setRemoteIDType(elementvalue); }
|
|
else if (elementname == "Use UDP-protocol") { data->setUseUdp(elementvalue.toInt()); }
|
|
else if (elementname == "Use UDP-port") { data->setUseUdpPort(elementvalue.toInt()); }
|
|
else if (elementname == "local UDP port") { data->setUdpPort(elementvalue.toInt()); }
|
|
else if (elementname == "use DNS_UPDATE") { data->setUseDnsUpdate(elementvalue.toInt()); }
|
|
else if (elementname == "use DNS-server") { data->setUseDnsServer(elementvalue.toInt()); }
|
|
else if (elementname == "DNS server") { data->setDnsServer(elementvalue); }
|
|
else if (elementname == "refuse 40 bit encryption") { data->setRefuse40BitEncryption(elementvalue.toInt()); }
|
|
else if (elementname == "refuse 128 bit encryption") { data->setRefuse128BitEncryption(elementvalue.toInt()); }
|
|
else if (elementname == "require stateless encryption") { data->setAllowStatefulMode(elementvalue.toInt()); }
|
|
else if (elementname == "require mppe") { data->setRequireMppe(elementvalue.toInt()); }
|
|
else if (elementname == "Disable MPPE compression") { data->setDisableMPPEComp(elementvalue.toInt()); }
|
|
else if (elementname == "Local virtual IP") { data->setLocalVirtualIP(elementvalue); }
|
|
else if (elementname == "Remote virtual IP") { data->setRemoteVirtualIP(elementvalue); }
|
|
else if (elementname == "Pre shared key file") { data->setPreSharedKeyFile(elementvalue); }
|
|
else if (elementname == "Execute command before connect") { data->setExecuteCmdBeforeConnect(elementvalue.toInt()); }
|
|
else if (elementname == "Execute command after connect") { data->setExecuteCmdAfterConnect(elementvalue.toInt()); }
|
|
else if (elementname == "Execute command before disconnect") { data->setExecuteCmdBeforeDisconnect(elementvalue.toInt()); }
|
|
else if (elementname == "Execute command after disconnect") { data->setExecuteCmdAfterDisconnect(elementvalue.toInt()); }
|
|
else if (elementname == "Command before connect") { data->setCommandBeforeConnect(elementvalue); }
|
|
else if (elementname == "Command after connect") { data->setCommandAfterConnect(elementvalue); }
|
|
else if (elementname == "Command before disconnect") { data->setCommandBeforeDisconnect(elementvalue); }
|
|
else if (elementname == "Command after disconnect") { data->setCommandAfterDisconnect(elementvalue); }
|
|
else if (elementname == "Use no BSD compression") { data->setUseNoBsdComp(elementvalue.toInt()); }
|
|
else if (elementname == "Do not use no IP by default") { data->setUseNoIpDefault(elementvalue.toInt()); }
|
|
else if (elementname == "Use no deflate") { data->setUseNoDeflate(elementvalue.toInt()); }
|
|
else if (elementname == "Replace default route") { data->setReplaceDefaultRoute(elementvalue.toInt()); }
|
|
else if (elementname == "Use own MTU") { data->setUseMtu(elementvalue.toInt()); }
|
|
else if (elementname == "Use own MRU") { data->setUseMru(elementvalue.toInt()); }
|
|
else if (elementname == "MTU for pppd") { data->setMtu(elementvalue.toInt()); }
|
|
else if (elementname == "MRU for pppd") { data->setMru(elementvalue.toInt()); }
|
|
else if (elementname == "Use virtual IP") { data->setUseVirtualIP(elementvalue.toInt()); }
|
|
else if (elementname == "Virtual IP") { data->setVirtualIP(elementvalue); }
|
|
else if (elementname == "PSK is in file") { data->setPskIsInFile(elementvalue.toInt()); }
|
|
else if (elementname == "Use additional network routes") { data->setUseAdditionalNetworkRoutes(elementvalue.toInt()); }
|
|
else if (elementname == "Hash algorithm") { data->setHashAlgo(elementvalue); }
|
|
else if (elementname == "Encryption algorithm") { data->setEncryptionAlgorithm(elementvalue); }
|
|
else if (elementname == "Authentication algorithm") { data->setAuthenticationAlgorithm(elementvalue); }
|
|
else if (elementname == "Tunnel device type") { data->setTunnelDeviceType(elementvalue); }
|
|
else if (elementname == "Use userdefined port") { data->setUseUserdefinedPort(elementvalue.toInt()); }
|
|
else if (elementname == "Userdefined port") { data->setUserdefinedPort(elementvalue.toInt()); }
|
|
else if (elementname == "NS cert type") { data->setNsCertType(elementvalue); }
|
|
else if (elementname == "Use NS cert type") { data->setUseNsCertType(elementvalue.toInt()); }
|
|
else if (elementname == "Use connection status check") { data->setUseConnectionStatusCheck(elementvalue.toInt()); }
|
|
else if (elementname == "Connection check success count") { data->setConnectionStatusCheckSuccessCount(elementvalue.toInt()); }
|
|
else if (elementname == "Connection check status interval") { data->setConnectionStatusInterval(elementvalue.toInt()); }
|
|
else if (elementname == "Do reconnect after connection lost") { data->setDoReconnectAfterConnectionLost(elementvalue.toInt()); }
|
|
else if (elementname == "Disable LZO compression") { data->setDisableLzoCompression(elementvalue.toInt()); }
|
|
else if (elementname == "AuthWithUsernameAndPassword") { data->setAuthWithUsernameAndPassword(elementvalue.toInt()); }
|
|
else if (elementname == "AllowEmptyGroupPassword") { data->setAllowEmptyGroupPassword(elementvalue.toInt()); }
|
|
else if (elementname == "Use userdefinied cipher") { data->setUseUserdefiniedCipher(elementvalue.toInt()); }
|
|
else if (elementname == "Userdefinied cipher") { data->setUserdefiniedCipher(elementvalue); }
|
|
else if (elementname == "Use redirect gateway") { data->setUseRedirectGateway(elementvalue.toInt()); }
|
|
// appPointer->processEvents(<< "</option>") { "\n";
|
|
else if (elementname == "Use TLS auth") { data->setUseTlsAuth(elementvalue.toInt()); }
|
|
else if (elementname == "TLS auth file") { data->setTlsAuthFile(elementvalue); }
|
|
else if (elementname == "Use HTTP proxy") { data->setUseHttpProxy(elementvalue.toInt()); }
|
|
else if (elementname == "HTTP proxy host") { data->setHttpProxy(elementvalue); }
|
|
else if (elementname == "HTTP proxy port") { data->setHttpProxyPort(elementvalue.toInt()); }
|
|
else if (elementname == "HTTP proxy timeout") { data->setHttpProxyTimeout(elementvalue.toInt()); }
|
|
else if (elementname == "Dont save username") { data->setDontSaveUsername(elementvalue.toInt()); }
|
|
else if (elementname == "Use mode config") { data->setUseModeConfig(elementvalue.toInt()); }
|
|
else if (elementname == "Exchange mode") { data->setExchangeMode(elementvalue); }
|
|
else if (elementname == "Use delay at reconnect") { data->setUseReconnectDelay(elementvalue.toInt()); }
|
|
else if (elementname == "Reconnect delay") { data->setReconnectDelay(elementvalue.toInt()); }
|
|
else if (elementname == "Use TLS host") { data->setUseTlsRemoteHost(elementvalue.toInt()); }
|
|
else if (elementname == "TLS remote host") { data->setTlsRemoteHost(elementvalue); }
|
|
else if (elementname == "Disable opportunistic encryption") { data->setDisableOpportunisticEncryption(elementvalue.toInt()); }
|
|
else if (elementname == "Right next hop") { data->setRightNextHop(elementvalue); }
|
|
else if (elementname == "Left next hop") { data->setLeftNextHop(elementvalue); }
|
|
else if (elementname == "Use userdefinied packet size for fragmentation") { data->setUseFragment(elementvalue.toInt()); }
|
|
else if (elementname == "Use userdef packet size") { data->setUseMssfix(elementvalue.toInt()); }
|
|
else if (elementname == "Fragment") { data->setFragment(elementvalue.toInt()); }
|
|
else if (elementname == "PeerTimeout") { data->setPeerTimeout(elementvalue.toInt()); }
|
|
else if (elementname == "Disable CCP") { data->setDisableCcp(elementvalue.toInt()); }
|
|
else if (elementname == "Use smartcard") { data->setUseSmartcard(elementvalue.toInt()); }
|
|
else if (elementname == "Use Xauth interactive") { data->setUseXauthInteractive(elementvalue.toInt()); }
|
|
else if (elementname == "Use HTTP Proxy Authentication") { data->setUseHttpProxyAuth(elementvalue.toInt()); }
|
|
else if (elementname == "HTTP Proxy Authtype") { data->setHttpProxyAuthType(elementvalue); }
|
|
else if (elementname == "HTTP Proxy Auth user") { data->setHttpProxyUser(elementvalue); }
|
|
else if (elementname == "HTTP Proxy Auth pass") { data->setHttpProxyPass(elementvalue); }
|
|
else if (elementname == "Use only CA cert and user auth") { data->setUseOnlyCaCertAndUserAuth(elementvalue.toInt()); }
|
|
else if (elementname == "Use mail address as identifier") { data->setUseMailAddressAsIdentifier(elementvalue.toInt()); }
|
|
else if (elementname == "Use right next hop") { data->setUseRightNextHop(elementvalue.toInt()); }
|
|
else if (elementname == "Use left next hop") { data->setUseLeftNextHop(elementvalue.toInt()); }
|
|
else if (elementname == "Pkcs11 providers") { data->setPkcs11Providers(elementvalue); }
|
|
else if (elementname == "Pkcs11 slot type") { data->setPkcs11SlotType(elementvalue); }
|
|
else if (elementname == "Pkcs11 slot") { data->setPkcs11Slot(elementvalue); }
|
|
else if (elementname == "Pkcs11 id type") { data->setPkcs11IdType(elementvalue); }
|
|
else if (elementname == "Pkcs11 id") { data->setPkcs11Id(elementvalue); }
|
|
else if (elementname == "Pkcs11 sign mode") { data->setPkcs11SignMode(elementvalue); }
|
|
else if (elementname == "Use Pkcs11 providers") { data->setUsePkcs11Providers(elementvalue.toInt()); }
|
|
else if (elementname == "Allow empty private key password") { data->setAllowEmptyPrivateKeyPassword(elementvalue.toInt()); }
|
|
else if (elementname == "Allow ip address change of peer") { data->setAllowIpAddressChangeOfPeer(elementvalue.toInt()); }
|
|
else if (elementname == "Auth method") { data->setAuthMethod(elementvalue); }
|
|
else if (elementname == "Command after connect delay time") { data->setCommandAfterConnectDelayTime(elementvalue.toInt()); }
|
|
else if (elementname == "Use search domain in resolv conf") { data->setUseSearchDomainInResolvConf(elementvalue.toInt()); }
|
|
else if (elementname == "Use domain in resolv conf") { data->setUseDomainInResolvConf(elementvalue.toInt()); }
|
|
else if (elementname == "Search domain in resolv conf") { data->setSearchDomainInResolvConf(elementvalue); }
|
|
else if (elementname == "Domain in resolv conf") { data->setDomainInResolvConf(elementvalue); }
|
|
else if (elementname == "Authentication direction") { data->setAuthenticationDirection(elementvalue); }
|
|
else if (elementname == "CiscoNatMode") { data->setCiscoNatMode(elementvalue); }
|
|
else if (elementname == "IPSec ESP") { data->setIpsecEsp(elementvalue); }
|
|
else if (elementname == "IPSec IKE") { data->setIpsecIke(elementvalue); }
|
|
else if (elementname == "Vtun profile") { data->setVtunProfile(elementvalue); }
|
|
else if (elementname == "Disable data encryption") { data->setDisableDataEncryption(elementvalue.toInt()); }
|
|
else if (elementname == "Use authentication algorithm") { data->setUseAuthenticationAlgorithm(elementvalue.toInt()); }
|
|
else if (elementname == "Fix path mtu discovery problem") { data->setFixPathMtuDiscoveryProblem(elementvalue.toInt()); }
|
|
else if (elementname == "Use remote network") { data->setUseRemoteNetwork(elementvalue.toInt()); }
|
|
else if (elementname == "Ipsec vpn mode") { data->setIpsecVpnMode(elementvalue); }
|
|
else if (elementname == "DisableHeaderCompression") { data->setDisableHeaderCompression(elementvalue.toInt()); }
|
|
else if (elementname == "DisableMagicNumberNegotiation") { data->setDisableMagicNumberNegotiation(elementvalue.toInt()); }
|
|
else if (elementname == "DisableIpx") { data->setDisableIpx(elementvalue.toInt()); }
|
|
else if (elementname == "Disable protocol field compression") { data->setDisableProtocolFieldCompression(elementvalue.toInt()); }
|
|
else if (elementname == "Disable adress control compression") { data->setDisableAdressControlCompression(elementvalue.toInt()); }
|
|
else if (elementname == "Use custom ike") { data->setUseCustomIke(elementvalue.toInt()); }
|
|
else if (elementname == "Use custom esp") { data->setUseCustomEsp(elementvalue.toInt()); }
|
|
else if (elementname == "Verify ca cert") { data->setVerifyCaCert(elementvalue.toInt()); }
|
|
else if (elementname == "Use DPD idle timeout") { data->setUseDpdIdleTimeout(elementvalue.toInt()); }
|
|
else if (elementname == "DPD idle timeout") { data->setDpdIdleTimeout(elementvalue.toInt()); }
|
|
else if (elementname == "Hide group password in accountdata dialog") { data->setHideGroupPasswordInAccountDataDialog(elementvalue.toInt()); }
|
|
else if (elementname == "MaxConnectTries") { data->setMaxConnectTries(elementvalue.toInt()); }
|
|
else if (elementname == "L2tpDaemon") { data->setL2tpDaemon((VpnAccountData::L2tpDaemonType)elementvalue.toInt()); }
|
|
else if (elementname == "UseLeftSourceIp") { data->setUseLeftSourceIp(elementvalue.toInt()); }
|
|
else if (elementname == "UseRightSourceIp") { data->setUseRightSourceIp(elementvalue.toInt()); }
|
|
else if (elementname == "LeftSourceIp") { data->setLeftSourceIp(elementvalue); }
|
|
else if (elementname == "RightSourceIp") { data->setRightSourceIp(elementvalue); }
|
|
else if (elementname == "Use virtual subnets") { data->setUseVirtualSubnetworks(elementvalue.toInt()); }
|
|
else if (elementname == "Virtual subnets") { data->setVirtualSubnetworks(elementvalue); }
|
|
else if (elementname == "DisablePushFromServer") { data->setDisablePushFromServer(elementvalue.toInt()); }
|
|
else if (elementname == "DisableBind") { data->setDisableBind(elementvalue.toInt()); }
|
|
else if (elementname == "UseRenegSec") { data->setUseRenegSec(elementvalue.toInt()); }
|
|
else if (elementname == "RenegSec") { data->setRenegSec(elementvalue.toInt()); }
|
|
else if (elementname == "UseTunnelPing") { data->setUseTunnelPing(elementvalue.toInt()); }
|
|
else if (elementname == "TunnelPing") { data->setTunnelPing(elementvalue.toInt()); }
|
|
else if (elementname == "UseTunnelPingRestart") { data->setUseTunnelPingRestart(elementvalue.toInt()); }
|
|
else if (elementname == "TunnelPingRestart") { data->setTunnelPingRestart(elementvalue.toInt()); }
|
|
else if (elementname == "RequireEap") { data->setRequireEap(elementvalue.toInt()); }
|
|
else if (elementname == "UseSshConfigRemoteScript") { data->setUseSshConfigRemoteScript(elementvalue.toInt()); }
|
|
else if (elementname == "SshConfigRemoteScript") { data->setSshConfigRemoteScript(elementvalue); }
|
|
else if (elementname == "AskUserPasswordOnEachConnect") { data->setAskUserPasswordOnEachConnect(elementvalue.toInt()); }
|
|
else if (elementname == "UseCiscoCertStore") { data->setUseCiscoCertStore(elementvalue.toInt()); }
|
|
else if (elementname == "UseNat") { data->setUseNat(elementvalue.toInt()); }
|
|
}
|
|
}
|
|
if (KvpncDebugLevel > 5)
|
|
std::cout << "profile end " << std::endl;
|
|
ImportedAccountList->append(data);
|
|
}
|
|
appPointer->processEvents();
|
|
}
|
|
TQApplication::restoreOverrideCursor();
|
|
KvpncImportProfileSelectionDialog selectdlg;
|
|
VpnAccountData *it=NULL;
|
|
|
|
if ( !ImportedAccountList->isEmpty() )
|
|
{
|
|
selectdlg.ImportProfileListView->takeItem(selectdlg.ImportProfileListView->currentItem());
|
|
selectdlg.ImportProfileListView->addColumn(i18n("Name"));
|
|
selectdlg.ImportProfileListView->addColumn(i18n("Type"));
|
|
selectdlg.ImportProfileListView->addColumn(i18n("Gateway"));
|
|
selectdlg.ImportNamePrefixLineEdit->setText( "kvpnc_import_");
|
|
|
|
TQCheckListItem *item;
|
|
for ( it = ImportedAccountList->first(); it; it = ImportedAccountList->next() )
|
|
{
|
|
TQString name = it->getName();
|
|
TQString type;
|
|
if ( it->getConnectionType() == VpnAccountData::cisco )
|
|
type = "cisco" ;
|
|
else if ( it->getConnectionType() == VpnAccountData::ciscoorig )
|
|
type = "ciscoorig" ;
|
|
else if ( it->getConnectionType() == VpnAccountData::racoon )
|
|
type = "racoon" ;
|
|
else if ( it->getConnectionType() == VpnAccountData::l2tpd_racoon )
|
|
type = "l2tpd (racoon)" ;
|
|
else if ( it->getConnectionType() == VpnAccountData::freeswan )
|
|
type = "freeswan" ;
|
|
else if ( it->getConnectionType() == VpnAccountData::l2tpd_freeswan )
|
|
type = "l2tpd (openswan)" ;
|
|
else if ( it->getConnectionType() == VpnAccountData::pptp )
|
|
type = "pptp" ;
|
|
else if ( it->getConnectionType() == VpnAccountData::openvpn )
|
|
type = "openvpn" ;
|
|
else
|
|
type = i18n("other");
|
|
|
|
|
|
// litem->setSelectable(true);
|
|
item = new TQCheckListItem(selectdlg.ImportProfileListView,it->getName(),TQCheckListItem::CheckBox);
|
|
item->setText(1,type);
|
|
item->setText(2,it->getGateway());
|
|
selectdlg.ImportProfileListView->insertItem(item);
|
|
|
|
// std::cout << "insert profile into listview: " << name << std::endl;
|
|
}
|
|
}
|
|
bool ret = selectdlg.exec();
|
|
|
|
if (ret == true)
|
|
{
|
|
importGlobal=selectdlg.ImportGlobalSettingsCheckBox->isChecked();
|
|
TQListViewItemIterator it2( selectdlg.ImportProfileListView );
|
|
for ( ; it2.current(); ++it2 )
|
|
{
|
|
if ( ( (TQCheckListItem*)it2.current() )->isOn() )
|
|
{
|
|
VpnAccountData *data=NULL;
|
|
it = 0;
|
|
for ( it = ImportedAccountList->first(); it; it = ImportedAccountList->next() )
|
|
{
|
|
if ( it->getName() == ( (TQCheckListItem*)it2.current() )->text() && ( (TQCheckListItem*)it2.current() )->isOn() )
|
|
{
|
|
data = it;
|
|
importCount++;
|
|
|
|
// FIXME last profilename here
|
|
RetName=it->getName();
|
|
|
|
data->setName(selectdlg.ImportNamePrefixLineEdit->text()+data->getName());
|
|
|
|
bool ok = false;
|
|
VpnAccountData * it;
|
|
bool nameOk = false;
|
|
while ( nameOk == false )
|
|
{
|
|
for ( it = AccountList->first(); it; it = AccountList->next() )
|
|
{
|
|
if ( it->getName() == data->getName() )
|
|
{
|
|
//account->setName( TQString( account->getName() + "_2" ) );
|
|
// KMessageBox::information ( this, i18n( "Profile name exists!\n It will be renamed to \"%1\"." ).arg( account->getName() ), i18n( "Name exist, renamed" ) );
|
|
KMessageBox::error ( 0, i18n ( "Profile name exists!" ), i18n ( "Name Exists" ) );
|
|
nameOk = false;
|
|
TQString newName = KInputDialog::getText ( i18n ( "New Name" ), i18n ( "New name for profile:" ), TQString ( data->getName() + "_2" ), &ok );
|
|
if (newName.isEmpty())
|
|
{
|
|
KMessageBox::information ( 0, i18n ( "Import was canceled." ) );
|
|
appendLogEntry ( i18n ( "Import was canceled." ), info );
|
|
return false;
|
|
}
|
|
if (newName != it->getName() )
|
|
{
|
|
data->setName ( newName );
|
|
nameOk = true;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
nameOk = true;
|
|
}
|
|
}
|
|
}
|
|
|
|
if ( nameOk == true )
|
|
{
|
|
AccountList->append(data);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
if (selectdlg.OpenProfileManagerCheckBox->isChecked())
|
|
openProfileManager=true;
|
|
}
|
|
else
|
|
{
|
|
KMessageBox::sorry ( 0, i18n ( "Import canceled." ) );
|
|
return false;
|
|
}
|
|
}
|
|
|
|
TQDomElement e = n.toElement(); // try to convert the node to an element.
|
|
if( !e.isNull() ) {
|
|
std::cout << e.tagName() << std::endl; // the node really is an element.
|
|
}
|
|
n = n.nextSibling();
|
|
}
|
|
if (KvpncDebugLevel > 5)
|
|
std::cout << "dom doc end" << std::endl;
|
|
|
|
if (importGlobal == true)
|
|
{
|
|
this-> pathToVpnc= pathToVpnc;
|
|
this-> pathToCiscoVpnc= pathToCiscoVpnc;
|
|
this-> pathToRacoon= pathToRacoon;
|
|
this-> pathToSetkey= pathToSetkey;
|
|
this-> pathToIptables= pathToIptables;
|
|
this-> pathToIptables= pathToIptables;
|
|
this-> pathToIpsec= pathToIpsec;
|
|
this-> pathToPppd= pathToPppd;
|
|
this-> pathToPptp= pathToPptp;
|
|
this-> pathToL2tpd= pathToL2tpd;
|
|
this-> pathToXl2tpd= pathToXl2tpd;
|
|
this-> pathToSsh= pathToSsh;
|
|
this-> pathToKill= pathToKill;
|
|
this-> pathToKillall= pathToKillall;
|
|
this-> pathToPing= pathToPing;
|
|
this-> pathToOpenvpn= pathToOpenvpn;
|
|
this-> pathToIp= pathToIp;
|
|
this-> pathToIfconfig= pathToIfconfig;
|
|
this-> pathToRoute= pathToRoute;
|
|
this-> pathToNetstat= pathToNetstat;
|
|
this-> pathToPkcs11Tool= pathToPkcs11Tool;
|
|
this-> AutoConnectProfile= AutoConnectProfile;
|
|
this-> RacoonDebugLevel= RacoonDebugLevel;
|
|
this-> Vpnc_pid_file= Vpnc_pid_file;
|
|
this-> Pppd_pid_file= Pppd_pid_file;
|
|
this-> lastProfile= lastProfile;
|
|
this-> logfileName= logfileName;
|
|
this->minimizeAfterConnect= minimizeAfterConnect;
|
|
this->showDebugConsole= showDebugConsole;
|
|
this-> writeLogFile= writeLogFile;
|
|
this-> useDefaultPaths= useDefaultPaths;
|
|
this-> useSilentQuit= useSilentQuit;
|
|
this-> holdGeneratedScripts= holdGeneratedScripts;
|
|
this-> programsInPath= programsInPath;
|
|
this-> enableDebugPppd= enableDebugPppd;
|
|
this-> enableDebugPptpd= enableDebugPptpd;
|
|
this-> enableDebugL2tpd= enableDebugL2tpd;
|
|
this-> enableDebugXl2tpd= enableDebugXl2tpd;
|
|
this-> enableFreeswanVerbose= enableFreeswanVerbose;
|
|
this-> enableDebugOpenvpn= enableDebugOpenvpn;
|
|
this-> useColorizedLogOutput= useColorizedLogOutput;
|
|
this-> showInterfaceIPinTooltip= showInterfaceIPinTooltip;
|
|
this-> dontQuitOnCloseEvent= dontQuitOnCloseEvent;
|
|
this-> doAutoConnectAtStartup= doAutoConnectAtStartup;
|
|
this-> useTDEwallet= useTDEwallet;
|
|
this-> showStatusBar= showStatusBar;
|
|
this-> showToolBar= showToolBar;
|
|
this-> hideMainWindow= hideMainWindow;
|
|
this-> PppdDebugLevel= PppdDebugLevel;
|
|
this-> firstUseOfTDEwallet= firstUseOfTDEwallet;
|
|
this-> shutdownIsCalled= shutdownIsCalled;
|
|
this-> skipTDEwalletStoring= skipTDEwalletStoring;
|
|
this-> hideOnCloseInfo= hideOnCloseInfo;
|
|
this-> feedbackMailSent= feedbackMailSent;
|
|
this-> doKillL2tpdIfStillRunning= doKillL2tpdIfStillRunning;
|
|
this-> doKillXl2tpdIfStillRunning= doKillXl2tpdIfStillRunning;
|
|
this-> doKillRacoonIfStillRunning= doKillRacoonIfStillRunning;
|
|
this-> showConnectionTimeInTooltip= showConnectionTimeInTooltip;
|
|
this-> VpncDebugLevel= VpncDebugLevel;
|
|
this-> KvpncDebugLevel= KvpncDebugLevel;
|
|
this-> OpenvpnDebugLevel= OpenvpnDebugLevel;
|
|
this-> PptpLogLevel= PptpLogLevel;
|
|
this-> SshDebugLevel= SshDebugLevel;
|
|
this-> LogViewerFontSize= LogViewerFontSize;
|
|
this-> mainwindow_pos_x= mainwindow_pos_x;
|
|
this-> mainwindow_pos_y= mainwindow_pos_y;
|
|
this-> mainwindow_height= mainwindow_height;
|
|
this-> mainwindow_width= mainwindow_width;
|
|
this-> connectSleepDelay= connectSleepDelay;
|
|
this-> connectSleepRetry= connectSleepRetry;
|
|
this-> tryConnectTimeout= tryConnectTimeout;
|
|
this-> connectionStartTime= connectionStartTime;
|
|
this-> runningCheckCounter= runningCheckCounter;
|
|
this-> runningCheckTimeout= runningCheckTimeout;
|
|
this-> OpenvpnManagementPort= OpenvpnManagementPort;
|
|
this->InfoLogColor= InfoLogColor;
|
|
this->RemoteLogColor= RemoteLogColor;
|
|
this->ErrorLogColor= ErrorLogColor;
|
|
this->SuccessLogColor= SuccessLogColor;
|
|
this->DebugLogColor= DebugLogColor;
|
|
this->DebugBackgroundcolor= DebugBackgroundcolor;
|
|
this->pos= pos;
|
|
this->WindowPos= WindowPos;
|
|
this->WindowSize= WindowSize;
|
|
|
|
}
|
|
saveOptions();
|
|
|
|
TQString msg="";
|
|
if (importCount > 0 && importGlobal==true)
|
|
msg = i18n("Import was successful. %1 profiles and global settings are imported.").arg(TQString::number(importCount));
|
|
if (importCount > 0 && importGlobal==false)
|
|
msg = i18n("Import was successful. %1 profiles are imported.").arg(TQString::number(importCount));
|
|
if (importCount < 1 && importGlobal==false)
|
|
msg = i18n("Import was successful. Global settings are imported.");
|
|
KMessageBox::information ( 0, msg,i18n("Import success") );
|
|
}
|
|
else
|
|
{
|
|
KMessageBox::error ( 0, i18n ( "Reading of \"%1\" has been failed!" ).arg ( filename ) );
|
|
appendLogEntry (i18n ( "Reading of \"%1\" has been failed!" ).arg ( filename ), error);
|
|
TQApplication::restoreOverrideCursor();
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
bool KVpncConfig::importIpsecConfig(TQString filename, TQString& RetName, bool& openProfileManager)
|
|
{
|
|
TQFile importfile (filename);
|
|
if (!importfile.exists())
|
|
{
|
|
KMessageBox::error ( 0, i18n ( "Reading of \"%1\" has been failed!" ).arg ( filename ) );
|
|
return false;
|
|
}
|
|
TQPtrList<VpnAccountData> *ImportedAccountList = new TQPtrList<VpnAccountData>();
|
|
ImportedAccountList->setAutoDelete( TRUE ); // the list owns the objects
|
|
TQPtrList<IpsecImportSection> *IpsecImportSectionList = new TQPtrList<IpsecImportSection>();
|
|
|
|
bool isIpsecGlobalSection=false;
|
|
bool firstSectionFound=false;
|
|
bool defaultSectionFound=false;
|
|
bool useNat=false;
|
|
bool disableOpportunisticEncryption=true;
|
|
TQStringList InterfaceList;
|
|
int IpsecVersion=1;
|
|
// bool pskIsInFile=true;
|
|
TQString PskFile="/etc/ipsec.secrets";
|
|
TQString CertPath="/etc/ipsec.d/certs";
|
|
|
|
TQString IpsecConfigSection="";
|
|
bool validLineFound=false;
|
|
if ( importfile.open(IO_ReadOnly))
|
|
{
|
|
TQString line = NULL;
|
|
TQString IpsecConfigSectionName="";
|
|
TQString IpsecConfigData="";
|
|
bool sectionEndFound=false;
|
|
|
|
// std::cout << "pass1: collecting sections" << std::endl;
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import ipsec config: pass1: collecting sections"),debug);
|
|
TQTextStream stream(&importfile);
|
|
while ( !stream.atEnd() )
|
|
{
|
|
line = stream.readLine().replace("\"","");
|
|
|
|
// std::cout << "line: \"" << line << "\"" << std::endl;
|
|
|
|
if ( IpsecConfigSectionName!="" && ( line=="\n" || removeWhiteSpaceAtBegin(line) =="\n" || line == NULL || line.startsWith("include") || line.startsWith("conn") ))
|
|
{
|
|
// end of section found
|
|
// std::cout << "end of section " << IpsecConfigSectionName << " found." << std::endl;
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n("import ipsec config: end of section %1 found.").arg(IpsecConfigSectionName), debug);
|
|
sectionEndFound=true;
|
|
|
|
IpsecImportSection *section = new IpsecImportSection();
|
|
section->SectionName = IpsecConfigSectionName;
|
|
section->SectionData = IpsecConfigData;
|
|
IpsecImportSectionList->append(section);
|
|
IpsecConfigData="";
|
|
IpsecConfigSectionName="";
|
|
|
|
// std::cout << "Section:"<< std::endl;
|
|
// std::cout << section->SectionName << std::endl;
|
|
// std::cout << section->SectionData.join("\n");
|
|
// std::cout << "-------------------"<< std::endl;
|
|
|
|
if (KvpncDebugLevel > 2)
|
|
{
|
|
appendLogEntry( "import ipsec config: Section:", debug);
|
|
appendLogEntry( section->SectionName , debug);
|
|
appendLogEntry( section->SectionData.join("\n"), debug);
|
|
appendLogEntry( "-------------------", debug);
|
|
}
|
|
}
|
|
|
|
if (line.startsWith("conn"))
|
|
{
|
|
// section found
|
|
IpsecConfigSectionName=line.simplifyWhiteSpace().section('#',0,0).section(" ",1,1);
|
|
// std::cout << "normal section found: " << IpsecConfigSectionName << std::endl;
|
|
|
|
isIpsecGlobalSection=false;
|
|
|
|
if (IpsecConfigSectionName == "%default")
|
|
{
|
|
defaultSectionFound=true;
|
|
sectionEndFound=false;
|
|
firstSectionFound=true;
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry( i18n ("import ipsec config: default section found."), debug);
|
|
}
|
|
else
|
|
{
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry( i18n ("import ipsec config: normal section found: ") + IpsecConfigSectionName , debug);
|
|
sectionEndFound=false;
|
|
firstSectionFound=true;
|
|
}
|
|
}
|
|
if (line.startsWith("version"))
|
|
{
|
|
IpsecVersion=int(TQString(line.simplifyWhiteSpace().section('#',0,0).section(" ",1,1).stripWhiteSpace()).toFloat());
|
|
validLineFound=true;
|
|
// std::cout << "ipsec version found: " << IpsecVersion << std::endl;
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import ipsec config: ipsec version found: ")+ TQString().setNum(IpsecVersion) ,debug);
|
|
}
|
|
if (line.startsWith("config setup"))
|
|
{
|
|
// config section found
|
|
isIpsecGlobalSection=true;
|
|
validLineFound=true;
|
|
// std::cout << "global section found." << std::endl;
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import ipsec config: global section found."),debug);
|
|
}
|
|
|
|
if (isIpsecGlobalSection==true)
|
|
{
|
|
TQString line2 = removeWhiteSpaceAtBegin( line);
|
|
// std::cout << "global section line: " << line2 << std::endl;
|
|
if (line2.startsWith("plutodebug"))
|
|
{
|
|
validLineFound=true;
|
|
// FIXME not implemented yet
|
|
}
|
|
if (line2.startsWith("nat_traversal="))
|
|
{
|
|
validLineFound=true;
|
|
useNat=false;
|
|
if (line2.section('=',1,1) == "yes")
|
|
{
|
|
useNat=true;
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import ipsec config: use NAT."),debug);
|
|
}
|
|
else
|
|
{
|
|
useNat=false;
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import ipsec config: use no NAT."),debug);
|
|
}
|
|
}
|
|
|
|
if (line2.startsWith("interfaces="))
|
|
{
|
|
validLineFound=true;
|
|
if (line2.section('=',1,1) == "%defaultroute")
|
|
{
|
|
InterfaceList.append("default");
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import ipsec config: use interface where default route points"),debug);
|
|
}
|
|
else
|
|
{
|
|
InterfaceList = TQStringList::split(' ',line2.replace("interfaces=","").replace(TQRegExp("ipsec[0-9]="),""));
|
|
// std::cout << "interface list: " << InterfaceList << std::endl;
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import ipsec config: use interface from list:")+ " "+InterfaceList.join(", "),debug);
|
|
}
|
|
}
|
|
}
|
|
|
|
if (line.startsWith("include /etc/ipsec.d/examples/no_oe.conf"))
|
|
{
|
|
validLineFound=true;
|
|
isIpsecGlobalSection=false;
|
|
// std::cout << "opportunistic enncrytion disabled found." << std::endl;
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import ipsec config: opportunistic encrytion disabled found"),debug);
|
|
|
|
disableOpportunisticEncryption=true;
|
|
}
|
|
|
|
if (!sectionEndFound && firstSectionFound==true)
|
|
{
|
|
// collecting data
|
|
TQString cleanLine = removeWhiteSpaceAtBegin(line)+"\n";
|
|
// std:: cout << "clean line: \"" << cleanLine << "\"" << std::endl;
|
|
if (!cleanLine.startsWith("#") && !cleanLine.startsWith("include") && cleanLine != "" && !line.startsWith("conn") && cleanLine != "\n")
|
|
{
|
|
// std:: cout << "appending line: \"" << line << "\"" << std::endl;
|
|
IpsecConfigData.append(line+"\n");
|
|
}
|
|
else
|
|
{
|
|
// std:: cout << "skipping line: \"" << line << "\"" << std::endl;
|
|
}
|
|
}
|
|
}
|
|
importfile.close();
|
|
if (IpsecConfigSectionName!="")
|
|
{
|
|
// end of section found
|
|
// std::cout << "end of section " << IpsecConfigSectionName << " found." << std::endl;
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry("end of section " + IpsecConfigSectionName +" found.",debug);
|
|
sectionEndFound=true;
|
|
|
|
IpsecImportSection *section = new IpsecImportSection();
|
|
section->SectionName = IpsecConfigSectionName;
|
|
section->SectionData = IpsecConfigData;
|
|
IpsecImportSectionList->append(section);
|
|
IpsecConfigData="";
|
|
IpsecConfigSectionName="";
|
|
}
|
|
|
|
|
|
|
|
|
|
// std::cout << "pass2: modifiy sections" << std::endl;
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import ipsec config: pass2: modifiy sections"),debug);
|
|
|
|
// std::cout << "sections: IpsecImportSectionList: " << IpsecImportSectionList->count() << std::endl;
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import ipsec config: sections: ") + TQString().setNum(IpsecImportSectionList->count()),debug);
|
|
|
|
if (!IpsecImportSectionList->isEmpty())
|
|
{
|
|
for ( int i=0; i< (int)IpsecImportSectionList->count();i++ )
|
|
{
|
|
IpsecImportSection *section = IpsecImportSectionList->at(i);
|
|
TQString Name= section->SectionName;
|
|
TQStringList data = TQStringList::split('\n',section->SectionData.join("\n"));
|
|
|
|
// std::cout << " => processing section: \"" << Name << "\"" << std::endl;
|
|
|
|
if (Name != "%default")
|
|
{
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import ipsec config: => processing section: ")+"\"" + Name + "\"",debug);
|
|
|
|
for ( TQStringList::Iterator it2 = data.begin(); it2 != data.end(); ++it2 )
|
|
{
|
|
TQString dataline = *it2;
|
|
// std::cout << "dataline found: \"" << dataline.remove("\n") << "\"" << std::endl;
|
|
if (removeWhiteSpaceAtBegin( dataline).startsWith("also="))
|
|
{
|
|
// std::cout << "also= found, looking for other section..." << std::endl;
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import ipsec config: also= found, looking for other section..."),debug);
|
|
|
|
TQString newdata = TQString(section->SectionData.join("\n"));
|
|
newdata.replace(TQRegExp("^.*also=.*$"),"");
|
|
section->SectionData= newdata;
|
|
|
|
TQString OtherSection=dataline.simplifyWhiteSpace().section('#',0,0).section("=",1,1);
|
|
// we have to find the other section and replace this line by the config data of the other section (after the =)
|
|
bool section_found=false;
|
|
for (IpsecImportSection * it3 = IpsecImportSectionList->first(); it3; it3 = IpsecImportSectionList->next() )
|
|
{
|
|
if (it3->SectionName == OtherSection)
|
|
{
|
|
// std::cout << "section " << OtherSection << " found, appending:" << std::endl;
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import ipsec config: section %1 found, appending:").arg(OtherSection),debug);
|
|
// std::cout << "other data:" << std::endl << it3->SectionData.join("\n") << "--------" << std::endl;
|
|
// std::cout << "section data:" << std::endl << section->SectionData.join("\n") << "--------" << std::endl;
|
|
section_found=true;
|
|
// data.remove(dataline);
|
|
dataline="";
|
|
// TQStringList otherdata = TQStringList::split("\n",TQString(it3->SectionData.join("\n")));
|
|
TQString OtherData = TQString(it3->SectionData.join("\n"));
|
|
|
|
TQStringList newdata;
|
|
|
|
for ( TQStringList::Iterator it6 = data.begin(); it6 != data.end(); ++it6 )
|
|
{
|
|
// std::cout << " also line: " << *it6 << std::endl;
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import ipsec config: also line: ") + TQString(*it6),debug);
|
|
|
|
if (TQString(*it6).find("also=") < 0)
|
|
{
|
|
// std::cout << " also= found." << std::endl;
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import ipsec config: also= found."),debug);
|
|
newdata.append(TQString(*it6));
|
|
}
|
|
else
|
|
{
|
|
// std::cout << " also= not found." << std::cout;
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import ipsec config: also= not found.") ,debug);
|
|
}
|
|
}
|
|
// newdata.append(data.join("\n"));
|
|
newdata.append(OtherData);
|
|
section->SectionData= newdata;
|
|
|
|
}
|
|
}
|
|
if (!section_found)
|
|
{
|
|
// std::cout << "section " << OtherSection << " not found, skipping" << std::endl;
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import ipsec config: section %1 not found, skipping").arg(OtherSection) ,debug);
|
|
}
|
|
|
|
}
|
|
}
|
|
|
|
if (defaultSectionFound==true)
|
|
{
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import ipsec config: => default section is set... "),debug);
|
|
|
|
for ( int i=0; i< (int)IpsecImportSectionList->count();i++ )
|
|
{
|
|
IpsecImportSection *section2 = IpsecImportSectionList->at(i);
|
|
TQString Name= section2->SectionName;
|
|
if (Name == "%default")
|
|
{
|
|
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import ipsec config: => appending %default section: ")+"\"" + section2->SectionData.join("\n") ,debug);
|
|
|
|
TQStringList defaultdata = TQStringList::split('\n',section2->SectionData.join("\n"));
|
|
|
|
|
|
for ( TQStringList::Iterator defaultit = defaultdata.begin(); defaultit != defaultdata.end(); ++defaultit )
|
|
{
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import ipsec config: => appending %default line: ")+"\"" + *defaultit,debug);
|
|
section->SectionData.append(*defaultit);
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// std::cout << "modified config" << std::endl << "---------------------" << std::endl;
|
|
// IpsecImportSection *it5=NULL;
|
|
// for ( it5 = IpsecImportSectionList->first(); it5; it5 = IpsecImportSectionList->next() )
|
|
// {
|
|
// TQString SectionName= it5->SectionName;
|
|
// TQStringList data = it5->SectionData;
|
|
//
|
|
// std::cout << SectionName << std::endl;
|
|
// std::cout << data.join("\n") << std::endl;
|
|
// }
|
|
|
|
// remove default section
|
|
for ( int i=0; i< (int)IpsecImportSectionList->count();i++ )
|
|
{
|
|
IpsecImportSection *section = IpsecImportSectionList->at(i);
|
|
TQString Name= section->SectionName;
|
|
if (Name == "%default")
|
|
{
|
|
IpsecImportSectionList->remove(IpsecImportSectionList->at(i));
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (KvpncDebugLevel > 2)
|
|
{
|
|
appendLogEntry(i18n ("modified config") ,debug);
|
|
appendLogEntry( "---------------------" ,debug);
|
|
IpsecImportSection *it5=NULL;
|
|
for ( it5 = IpsecImportSectionList->first(); it5; it5 = IpsecImportSectionList->next() )
|
|
{
|
|
TQString SectionName= it5->SectionName;
|
|
TQStringList data = it5->SectionData;
|
|
|
|
appendLogEntry(SectionName ,debug);
|
|
appendLogEntry(data.join("\n") ,debug);
|
|
}
|
|
}
|
|
|
|
|
|
// std::cout << "pass3: parse sections" << std::endl;
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import ipsec config: pass3: parse sections") ,debug);
|
|
|
|
|
|
if (!IpsecImportSectionList->isEmpty())
|
|
{
|
|
for ( int i=0; i< (int)IpsecImportSectionList->count();i++ )
|
|
{
|
|
IpsecImportSection *section = IpsecImportSectionList->at(i);
|
|
|
|
TQStringList sectiondata = TQStringList::split('\n',section->SectionData.join("\n"));
|
|
|
|
// std::cout << " => processing section: \"" << section->SectionName << "\"" << std::endl;
|
|
// std::cout << " => data: \"" << section->SectionData.join("\n") << "\"" << std::endl;
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import ipsec config: => processing section: ")+"\"" + section->SectionName + "\"" ,debug);
|
|
|
|
VpnAccountData *profiledata = new VpnAccountData(VpnAccountData::freeswan,TQString(section->SectionName)) ;
|
|
|
|
|
|
for ( TQStringList::Iterator it2 = sectiondata.begin(); it2!= sectiondata.end() ; it2++ )
|
|
{
|
|
TQString dataline = *it2;
|
|
|
|
|
|
|
|
|
|
|
|
TQString line2 = removeWhiteSpaceAtBegin ( dataline ); // line of text excluding '\n' and replace all white chars with one blank
|
|
// std::cout << "dataline: \"" << line2 << "\"";
|
|
if ( line2.startsWith ( "rightsubnet=" ) )
|
|
{
|
|
validLineFound=true;
|
|
TQString RightSubnet=line2.section ( "rightsubnet=",1,-1 );
|
|
// std::cout << "right subnet (remote) found: " << RightSubnet << std::endl;
|
|
if ( KvpncDebugLevel > 2 )
|
|
appendLogEntry ( i18n ( "import ipsec config: right subnet (remote) found: " ) + RightSubnet ,debug );
|
|
profiledata->setRemoteNetAddr ( RightSubnet.section ( '/',0,0 ) );
|
|
profiledata->setRemoteNetMask ( RightSubnet.section ( '/',1,1 ) );
|
|
|
|
profiledata->setUseRemoteNetwork ( true );
|
|
// std::cout << " => set it for profile " << IpsecConfigSection << " ." << std::endl;
|
|
// if (KvpncDebugLevel > 2)
|
|
// appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
|
|
}
|
|
if ( line2.startsWith ( "leftsubnet=" ) )
|
|
{
|
|
validLineFound=true;
|
|
TQString LeftSubnet=line2.section ( "leftsubnet=",1,-1 );
|
|
// std::cout << "left subnet (local) found: " << LeftSubnet << std::endl;
|
|
if ( KvpncDebugLevel > 2 )
|
|
appendLogEntry ( i18n ( "import ipsec config: left subnet (local) found: " ) + LeftSubnet ,debug );
|
|
// local subnet cant be set yet.
|
|
// profiledata->setLocalNetAddr(RightSubnet.section('/',0,0));
|
|
// profiledata->setLocalNetMask(RightSubnet.section('/',1,1));
|
|
// std::cout << " => set it for profile " << IpsecConfigSection << " ." << std::endl;
|
|
|
|
}
|
|
if ( line2.startsWith ( "rightnexthop=" ) )
|
|
{
|
|
validLineFound=true;
|
|
TQString RightNextHop=line2.section ( "rightnexthop=",1,-1 );
|
|
// std::cout << "right next hop (remote) found: " << RightNextHop << std::endl;
|
|
if ( KvpncDebugLevel > 2 )
|
|
appendLogEntry ( i18n ( "import ipsec config: right next hop (remote) found: " ) +RightNextHop ,debug );
|
|
profiledata->setRightNextHop ( RightNextHop );
|
|
profiledata->setUseRightNextHop(true);
|
|
// std::cout << " => set it for profile " << IpsecConfigSection << " ." << std::endl;
|
|
// if (KvpncDebugLevel > 2)
|
|
// appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
|
|
}
|
|
if ( line2.startsWith ( "leftnexthop=" ) )
|
|
{
|
|
validLineFound=true;
|
|
TQString LeftNextHop=line2.section ( "leftnexthop=",1,-1 );
|
|
std::cout << "left next hop (local) found: " << LeftNextHop << std::endl;
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry("import ipsec config: left next hop (local) found: " +LeftNextHop ,debug);
|
|
profiledata->setLeftNextHop(LeftNextHop);
|
|
profiledata->setUseLeftNextHop(true);
|
|
std::cout << " => set it for profile " << IpsecConfigSection << " ." << std::endl;
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
|
|
}
|
|
if ( line2.startsWith ( "left=" ) )
|
|
{
|
|
validLineFound=true;
|
|
TQString left=line2.section ( "left=",1,-1 );
|
|
// local ip cant be set yet.
|
|
// std::cout << "left found: " << left << std::endl;
|
|
// if (KvpncDebugLevel > 2)
|
|
// appendLogEntry("import ipsec config: left found: " + left ,debug);
|
|
// profiledata->setLocal (left);
|
|
// std::cout << " => set it for profile " << IpsecConfigSection << " ." << std::endl;
|
|
// if (KvpncDebugLevel > 2)
|
|
// appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
|
|
}
|
|
if ( line2.startsWith ( "right=" ) )
|
|
{
|
|
validLineFound=true;
|
|
TQString right=line2.section ( "right=",1,-1 );
|
|
// std::cout << "right (remote gateway) found: " << right << std::endl;
|
|
if ( KvpncDebugLevel > 2 )
|
|
appendLogEntry ( i18n ( "import ipsec config: right (remote gateway) found: " ) + right ,debug );
|
|
profiledata->setGateway ( right );
|
|
// std::cout << " => set it for profile " << IpsecConfigSection << " ." << std::endl;
|
|
// if (KvpncDebugLevel > 2)
|
|
// appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
|
|
}
|
|
if ( line2.startsWith ( "leftcert=" ) )
|
|
{
|
|
validLineFound=true;
|
|
TQString LeftCert=line2.section ( "leftcert=",1,-1 );
|
|
// std::cout << "left cert (local) found: " << LeftCert << std::endl;
|
|
if ( KvpncDebugLevel > 2 )
|
|
appendLogEntry ( i18n ( "import ipsec config: left cert (local) found: " ) + LeftCert ,debug );
|
|
profiledata->setX509Certificate ( LeftCert );
|
|
// std::cout << " => set it for profile " << IpsecConfigSection << " ." << std::endl;
|
|
// if (KvpncDebugLevel > 2)
|
|
// appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
|
|
}
|
|
if ( line2.startsWith ( "rightcert=" ) )
|
|
{
|
|
validLineFound=true;
|
|
TQString RightCert=line2.section("rightcert=",1,-1);
|
|
// std::cout << "right cert (remote) found: " << RightCert << std::endl;
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import ipsec config: right cert (remote) found: ") + RightCert ,debug);
|
|
profiledata->setUseSpecialServerCertificate(true);
|
|
profiledata->setSpecialServerCertificate(RightCert);
|
|
// std::cout << " => set it for profile " << IpsecConfigSection << " ." << std::endl;
|
|
// if (KvpncDebugLevel > 2)
|
|
// appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
|
|
}
|
|
if ( line2.startsWith ( "rightca=" ) )
|
|
{
|
|
validLineFound=true;
|
|
TQString RightCA=line2.section ( "rightca=",1,-1 );
|
|
// std::cout << "right CA (remote) found: " << RightCA << std::endl;
|
|
if ( KvpncDebugLevel > 2 )
|
|
appendLogEntry ( i18n ( "import ipsec config: right CA (remote) found: " ) +RightCA ,debug );
|
|
profiledata->setCaCertificate ( RightCA );
|
|
// std::cout << " => set it for profile " << IpsecConfigSection << " ." << std::endl;
|
|
// if (KvpncDebugLevel > 2)
|
|
// appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
|
|
}
|
|
if ( line2.startsWith ( "rightid=" ) )
|
|
{
|
|
validLineFound=true;
|
|
TQString RightID=line2.section ( "rightid=",1,-1 );
|
|
// std::cout << "right ID (remote) found: " << RightID << std::endl;
|
|
if ( KvpncDebugLevel > 2 )
|
|
appendLogEntry ( i18n ( "import ipsec config: right ID (remote) found: " ) + RightID ,debug );
|
|
profiledata->setUseSpecialRemoteID ( true );
|
|
profiledata->setSpecialRemoteID ( RightID );
|
|
profiledata->setRemoteIDType("keyid");
|
|
// std::cout << " => set it for profile " << IpsecConfigSection << " ." << std::endl;
|
|
// if (KvpncDebugLevel > 2)
|
|
// appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
|
|
}
|
|
if ( line2.startsWith ( "leftid=" ) )
|
|
{
|
|
validLineFound=true;
|
|
TQString LeftID=line2.section ( "leftid=",1,-1 );
|
|
// std::cout << "local ID (local) found: " << LeftID << std::endl;
|
|
if ( KvpncDebugLevel > 2 )
|
|
appendLogEntry ( i18n ( "import ipsec config: local ID (local) found: " ) + LeftID ,debug );
|
|
profiledata->setUseSpecialLocalID ( true );
|
|
profiledata->setSpecialLocalID ( LeftID );
|
|
profiledata->setLocalIDType("keyid");
|
|
// std::cout << " => set it for profile " << IpsecConfigSection << " ." << std::endl;
|
|
// if (KvpncDebugLevel > 2)
|
|
// appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
|
|
}
|
|
if ( line2.startsWith ( "rightrsasigkey=" ) )
|
|
{
|
|
validLineFound=true;
|
|
TQString RightRsaSigKey=line2.section ( "rightrsasigkey=",1,-1 );
|
|
// std::cout << "right uses (remote) " << RightRsaSigKey << std::endl;
|
|
if (RightRsaSigKey=="%cert")
|
|
{
|
|
if ( KvpncDebugLevel > 2 )
|
|
appendLogEntry ( i18n ( "import ipsec config: right (remote) uses cert" ),debug );
|
|
profiledata->setAuthType ( VpnAccountData::cert );
|
|
}
|
|
else
|
|
{
|
|
|
|
if ( KvpncDebugLevel > 2 )
|
|
appendLogEntry ( i18n ( "import ipsec config: right (remote) uses " ) + RightRsaSigKey ,debug );
|
|
profiledata->setAuthType ( VpnAccountData::psk );
|
|
|
|
// ok, we use special server cert here because at psk its unused
|
|
profiledata->setSpecialServerCertificate( RightRsaSigKey );
|
|
profiledata->setUseSpecialServerCertificate(true);
|
|
|
|
}
|
|
// std::cout << " => set it for profile " << IpsecConfigSection << " ." << std::endl;
|
|
// if (KvpncDebugLevel > 2)
|
|
// appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
|
|
}
|
|
if ( line2.startsWith ( "leftrsasigkey=" ) )
|
|
{
|
|
validLineFound=true;
|
|
TQString LeftRsaSigKey=line2.section ( "leftrsasigkey=",1,-1 );
|
|
// std::cout << "right uses (remote) " << LeftRsaSigKey << std::endl;
|
|
if (LeftRsaSigKey=="%cert")
|
|
{
|
|
if ( KvpncDebugLevel > 2 )
|
|
appendLogEntry ( i18n ( "import ipsec config: left (local) uses cert" ),debug );
|
|
profiledata->setAuthType ( VpnAccountData::cert );
|
|
|
|
}
|
|
else
|
|
{
|
|
|
|
if ( KvpncDebugLevel > 2 )
|
|
appendLogEntry ( i18n ( "import ipsec config: left (local) uses " ) + LeftRsaSigKey ,debug );
|
|
profiledata->setAuthType ( VpnAccountData::psk );
|
|
|
|
profiledata->setPreSharedKeyFile( LeftRsaSigKey );
|
|
profiledata->setPskIsInFile( true );
|
|
}
|
|
// std::cout << " => set it for profile " << IpsecConfigSection << " ." << std::endl;
|
|
// if (KvpncDebugLevel > 2)
|
|
// appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
|
|
}
|
|
if ( line2.startsWith ( "authby=" ) )
|
|
{
|
|
validLineFound=true;
|
|
TQString Authby=line2.simplifyWhiteSpace().section ( "authby=",1,1 );
|
|
// std::cout << "left and right use certs " << std::endl;
|
|
if ( Authby.find ( "rsasig", 0 , FALSE ) > -1 )
|
|
{
|
|
if ( KvpncDebugLevel > 2 )
|
|
appendLogEntry ( i18n ( "import ipsec config: left and right use certs." ) ,debug );
|
|
profiledata->setAuthType ( VpnAccountData::cert );
|
|
profiledata->setCertPath ( "/etc/ipsec.d/certs" );
|
|
//profiledata->setPskIsInFile ( true );
|
|
//profiledata->setPrivateKey ( "/etc/ipsec.secrets" );
|
|
}
|
|
else if ( Authby.find ( "secret", 0 , FALSE ) > -1 )
|
|
{
|
|
if ( KvpncDebugLevel > 2 )
|
|
appendLogEntry ( i18n ( "import ipsec config: left and right use psk." ) ,debug );
|
|
profiledata->setAuthType ( VpnAccountData::psk );
|
|
//profiledata->setPskIsInFile ( true );
|
|
//profiledata->setPreSharedKeyFile ( "/etc/ipsec.secrets" );
|
|
}
|
|
else
|
|
{
|
|
if ( KvpncDebugLevel > 2 )
|
|
appendLogEntry ( i18n ( "import ipsec config: left and right use unknown auth, guess psk" ) ,debug );
|
|
profiledata->setAuthType ( VpnAccountData::psk );
|
|
}
|
|
|
|
|
|
// std::cout << " => set it for profile " << IpsecConfigSection << " ." << std::endl;
|
|
// if (KvpncDebugLevel > 2)
|
|
// appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
|
|
}
|
|
if ( line2.startsWith ( "auto=start" ) )
|
|
{
|
|
// validLineFound=true;
|
|
// TQString Authby=line2.simplifyWhiteSpace().section('#',0,0).section("=",1,1);
|
|
// std::cout << "profile should be started" << std::endl;
|
|
// if (KvpncDebugLevel > 2)
|
|
// appendLogEntry("import ipsec config: profile should be started" ,debug);
|
|
// profiledata->setAuthType(VpnAccountData::cert);
|
|
// std::cout << " => set it for profile " << IpsecConfigSection << " ." << std::endl;
|
|
// if (KvpncDebugLevel > 2)
|
|
// appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
|
|
}
|
|
if ( line2.startsWith ( "leftsourceip=" ) )
|
|
{
|
|
validLineFound=true;
|
|
TQString leftsourceip=line2.section ( "leftsourceip=",1,-1 );
|
|
std::cout << "left (local) have to use IP address " << leftsourceip << std::endl;
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry("import ipsec config: left (local) have to use IP address " + leftsourceip ,debug);
|
|
profiledata->setLocalVirtualIP(leftsourceip);
|
|
// std::cout << " => set it for profile " << IpsecConfigSection << " ." << std::endl;
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
|
|
}
|
|
if ( line2.startsWith ( "virtual_private=" ) )
|
|
{
|
|
validLineFound=true;
|
|
TQString virtualprivate=line2.section ( "virtual_private=",1,-1 );
|
|
std::cout << "virtual private networks " << virtualprivate << std::endl;
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry("import ipsec config: virtual private networks " +virtualprivate ,debug);
|
|
profiledata->setLocalVirtualIP(virtualprivate);
|
|
profiledata->setUseVirtualIP(true);
|
|
// std::cout << " => set it for profile " << IpsecConfigSection << " ." << std::endl;
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
|
|
}
|
|
if ( line2.startsWith ( "rightsourceip=" ) )
|
|
{
|
|
validLineFound=true;
|
|
TQString rightsourceip=line2.section ( "rightsourceip=",1,-1 );
|
|
std::cout << "right (remote) have to use IP address " << rightsourceip << std::endl;
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry("import ipsec config: right (remote) have to use IP address " + rightsourceip ,debug);
|
|
profiledata->setRightSourceIp(rightsourceip);
|
|
profiledata->setUseRightSourceIp(true);
|
|
// std::cout << " => set it for profile " << IpsecConfigSection << " ." << std::endl;
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
|
|
}
|
|
if ( line2.startsWith ( "esp=" ) )
|
|
{
|
|
validLineFound=true;
|
|
TQString IpsecEsp=line2.section ( "esp=",1,-1 );
|
|
// std::cout << "esp settings found: " << IpsecEsp << std::endl;
|
|
if ( KvpncDebugLevel > 2 )
|
|
appendLogEntry ( i18n ( "import ipsec config: esp settings found: " ) + IpsecEsp ,debug );
|
|
profiledata->setIpsecEsp ( IpsecEsp );
|
|
profiledata->setUseCustomEsp(true);
|
|
// std::cout << " => set it for profile " << IpsecConfigSection << " ." << std::endl;
|
|
// if (KvpncDebugLevel > 2)
|
|
// appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
|
|
}
|
|
if ( line2.startsWith ( "ike=" ) )
|
|
{
|
|
validLineFound=true;
|
|
TQString IpsecIke=line2.section ( "ike=",1,-1 );
|
|
// std::cout << "ike settings found: " << IpsecIke << std::endl;
|
|
if ( KvpncDebugLevel > 2 )
|
|
appendLogEntry ( i18n ( "import ipsec config: ike settings found: " ) + IpsecIke ,debug );
|
|
profiledata->setIpsecIke ( IpsecIke );
|
|
profiledata->setUseCustomIke(true);
|
|
// std::cout << " => set it for profile " << IpsecConfigSection << " ." << std::endl;
|
|
// if (KvpncDebugLevel > 2)
|
|
// appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
|
|
}
|
|
if ( line2.startsWith ( "type=" ) )
|
|
{
|
|
validLineFound=true;
|
|
TQString IpsecVpnMode=line2.section ( "type=",1,1 );
|
|
// std::cout << "IpsecType found: " << IpsecType << std::endl;
|
|
if ( KvpncDebugLevel > 2 )
|
|
appendLogEntry ( i18n ( "import ipsec config: IPsec vpn mode found: " ) + IpsecVpnMode ,debug );
|
|
if ( IpsecVpnMode == "tunnel" )
|
|
profiledata->setIpsecVpnMode ( "tunnel" );
|
|
else
|
|
profiledata->setIpsecVpnMode ( "transport" );
|
|
// std::cout << " => set it for profile " << IpsecConfigSection << " ." << std::endl;
|
|
// if (KvpncDebugLevel > 2)
|
|
// appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
|
|
}
|
|
if ( line2.startsWith ( "leftxauthclient=" ) )
|
|
{
|
|
validLineFound=true;
|
|
TQString useXauth=line2.section ( "leftxauthclient=",1,1 );
|
|
if (useXauth=="yes")
|
|
{
|
|
//std::cout << "Use XAUTH: " << i18n("yes") << std::endl;
|
|
if ( KvpncDebugLevel > 2 )
|
|
appendLogEntry ( i18n ( "Use XAUTH (leftxauthclient found):" )+" " + i18n("yes") ,debug );
|
|
profiledata->setAuthWithUsernameAndPassword( true );
|
|
}
|
|
else
|
|
{
|
|
//std::cout << "Use XAUTH: " << i18n("no") << std::endl;
|
|
if ( KvpncDebugLevel > 2 )
|
|
appendLogEntry ( i18n ( "Use XAUTH (leftxauthclient found):" )+" " + i18n("no") ,debug );
|
|
profiledata->setAuthWithUsernameAndPassword( false );
|
|
}
|
|
// std::cout << " => set it for profile " << IpsecConfigSection << " ." << std::endl;
|
|
// if (KvpncDebugLevel > 2)
|
|
// appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
|
|
}
|
|
if ( line2.startsWith ( "rightxauthserver=" ) )
|
|
{
|
|
validLineFound=true;
|
|
TQString useXauth=line2.section ( "rightxauthserver=",1,-1 );
|
|
if (useXauth == "yes")
|
|
{
|
|
//std::cout << "Use XAUTH: " << i18n("yes") << std::endl;
|
|
if ( KvpncDebugLevel > 2 )
|
|
appendLogEntry ( i18n ( "Use XAUTH (rightxauthserver found):" )+" " + i18n("yes") ,debug );
|
|
profiledata->setAuthWithUsernameAndPassword( true );
|
|
}
|
|
else
|
|
{
|
|
//std::cout << "Use XAUTH: " << i18n("no") << std::endl;
|
|
if ( KvpncDebugLevel > 2 )
|
|
appendLogEntry ( i18n ( "Use XAUTH (rightxauthserver found):" )+" " + i18n("no") ,debug );
|
|
profiledata->setAuthWithUsernameAndPassword( false );
|
|
}
|
|
// std::cout << " => set it for profile " << IpsecConfigSection << " ." << std::endl;
|
|
// if (KvpncDebugLevel > 2)
|
|
// appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
|
|
}
|
|
if ( line2.startsWith ( "keyingtries=" ) )
|
|
{
|
|
validLineFound=true;
|
|
int MaxConnectTries=TQString(line2.section ( "keyingtries=",1,1 )).toInt();
|
|
// std::cout << "keyingtries found: " << MaxConnectTries << std::endl;
|
|
if ( KvpncDebugLevel > 2 )
|
|
appendLogEntry ( i18n ( "import ipsec config: keyingtries found: " ) + TQString().setNum(MaxConnectTries) ,debug );
|
|
profiledata->setMaxConnectTries ( MaxConnectTries );
|
|
// std::cout << " => set it for profile " << IpsecConfigSection << " ." << std::endl;
|
|
// if (KvpncDebugLevel > 2)
|
|
// appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
|
|
}
|
|
if ( line2.startsWith ( "pfs=" ) )
|
|
{
|
|
validLineFound=true;
|
|
TQString UsePerfectForwardSecrety=line2.section ( "pfs=",1,1 ).remove ( '"' );
|
|
if (UsePerfectForwardSecrety =="yes")
|
|
{
|
|
//std::cout << "Use PFS: " << i18n("yes") << std::endl;
|
|
if ( KvpncDebugLevel > 2 )
|
|
appendLogEntry ( i18n ( "Use PFS:" )+" " + i18n("yes") ,debug );
|
|
profiledata->setUsePerfectForwardSecrety( true );
|
|
}
|
|
else
|
|
{
|
|
//std::cout << "Use PFS: " << i18n("no") << std::endl;
|
|
if ( KvpncDebugLevel > 2 )
|
|
appendLogEntry ( i18n ( "Use PFS:" )+" " + i18n("no") ,debug );
|
|
profiledata->setUsePerfectForwardSecrety( false );
|
|
}
|
|
// std::cout << " => set it for profile " << IpsecConfigSection << " ." << std::endl;
|
|
// if (KvpncDebugLevel > 2)
|
|
// appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
|
|
}
|
|
if ( line2.startsWith ( "pfsgroup=" ) )
|
|
{
|
|
validLineFound=true;
|
|
TQString PerfectForwardSecrety=line2.section ( "pfsgroup=",1,1 );
|
|
// std::cout << "keyingtries found: " << MaxConnectTries << std::endl;
|
|
if ( KvpncDebugLevel > 2 )
|
|
appendLogEntry ( i18n ( "import ipsec config: PFS group found: " ) + PerfectForwardSecrety ,debug );
|
|
profiledata->setPerfectForwardSecrety ( PerfectForwardSecrety );
|
|
// std::cout << " => set it for profile " << IpsecConfigSection << " ." << std::endl;
|
|
// if (KvpncDebugLevel > 2)
|
|
// appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
|
|
}
|
|
if ( line2.startsWith ( "aggrmode=" ) )
|
|
{
|
|
validLineFound=true;
|
|
TQString UseAgressiveMode=line2.section ( "aggrmode=",1,1 ).remove ( '"' );
|
|
if (UseAgressiveMode == "yes")
|
|
{
|
|
//std::cout << "Exchange mode: " << i18n("aggressive") << std::endl;
|
|
if ( KvpncDebugLevel > 2 )
|
|
appendLogEntry ( i18n ( "Exchange mode:" )+" " + "aggressive" ,debug );
|
|
profiledata->setExchangeMode( "aggressive" );
|
|
}
|
|
else
|
|
{
|
|
//std::cout << "Exchange mode: " << i18n("main") << std::endl;
|
|
if ( KvpncDebugLevel > 2 )
|
|
appendLogEntry ( i18n ( "Exchange mode:" )+" " + "main" ,debug );
|
|
profiledata->setExchangeMode( "main" );
|
|
}
|
|
// std::cout << " => set it for profile " << IpsecConfigSection << " ." << std::endl;
|
|
// if (KvpncDebugLevel > 2)
|
|
// appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
|
|
}
|
|
|
|
else
|
|
{
|
|
// std::cout << "comment found." << std::endl;
|
|
}
|
|
}
|
|
|
|
if ( useNat )
|
|
{
|
|
profiledata->setUseNat ( true );
|
|
// std::cout << "nat_traversal=yes found, enabling nat." << std::endl;
|
|
if ( KvpncDebugLevel > 2 )
|
|
appendLogEntry ( i18n ( "import ipsec config: nat_traversal=yes found, enabling nat." ) ,debug );
|
|
}
|
|
else
|
|
{
|
|
profiledata->setUseNat ( false );
|
|
// std::cout << "nat_traversal=no found, disabling nat." << std::endl;
|
|
if ( KvpncDebugLevel > 2 )
|
|
appendLogEntry ( i18n ( "import ipsec config: nat_traversal=no found, disabling nat." ) ,debug );
|
|
}
|
|
if ( disableOpportunisticEncryption== true )
|
|
{
|
|
profiledata->setDisableOpportunisticEncryption ( true );
|
|
}
|
|
else
|
|
{
|
|
profiledata->setDisableOpportunisticEncryption ( false );
|
|
}
|
|
|
|
|
|
|
|
// FIXME we only use the first in list
|
|
TQString Interface = InterfaceList.first();
|
|
profiledata->setNetworkDevice(Interface);
|
|
|
|
profiledata->setName("kvpnc_import_"+profiledata->getName());
|
|
profiledata->setDescription(TQString(i18n("import from ")+filename));
|
|
ImportedAccountList->append(profiledata);
|
|
}
|
|
}
|
|
|
|
|
|
KvpncImportProfileSelectionBase selectdlg;
|
|
selectdlg.ImportGlobalSettingsCheckBox->hide();
|
|
VpnAccountData *it=NULL;
|
|
int importCount=0;
|
|
|
|
if ( !ImportedAccountList->isEmpty() )
|
|
{
|
|
selectdlg.ImportProfileListView->takeItem(selectdlg.ImportProfileListView->currentItem());
|
|
selectdlg.ImportProfileListView->addColumn(i18n("Name"));
|
|
selectdlg.ImportProfileListView->addColumn(i18n("Type"));
|
|
selectdlg.ImportProfileListView->addColumn(i18n("Gateway"));
|
|
selectdlg.ImportProfileListView->addColumn(i18n("Authentication"));
|
|
selectdlg.ImportProfileListView->addColumn(i18n("Remote network"));
|
|
TQCheckListItem *item;
|
|
for ( it = ImportedAccountList->first(); it; it = ImportedAccountList->next() )
|
|
{
|
|
TQString name = it->getName();
|
|
TQString type="";
|
|
if ( it->getConnectionType() == VpnAccountData::cisco )
|
|
type = "cisco" ;
|
|
else if ( it->getConnectionType() == VpnAccountData::ciscoorig )
|
|
type = "ciscoorig" ;
|
|
else if ( it->getConnectionType() == VpnAccountData::racoon )
|
|
type = "racoon" ;
|
|
else if ( it->getConnectionType() == VpnAccountData::l2tpd_racoon )
|
|
type = "l2tpd (racoon)" ;
|
|
else if ( it->getConnectionType() == VpnAccountData::freeswan )
|
|
type = "ipsec" ;
|
|
else if ( it->getConnectionType() == VpnAccountData::l2tpd_freeswan )
|
|
type = "l2tpd (ipsec)" ;
|
|
else if ( it->getConnectionType() == VpnAccountData::pptp )
|
|
type = "pptp" ;
|
|
else if ( it->getConnectionType() == VpnAccountData::openvpn )
|
|
type = "openvpn" ;
|
|
else
|
|
type = i18n("other");
|
|
|
|
// litem->setSelectable(true);
|
|
item = new TQCheckListItem(selectdlg.ImportProfileListView,it->getName(),TQCheckListItem::CheckBox);
|
|
item->setText(1,type);
|
|
item->setText(2,it->getGateway());
|
|
if (it->getAuthType() == VpnAccountData::cert)
|
|
item->setText(3,i18n("certificate"));
|
|
else if (it->getAuthType() == VpnAccountData::psk)
|
|
item->setText(3,i18n("preshared key"));
|
|
else if (it->getAuthType() == VpnAccountData::hybrid)
|
|
item->setText(3,i18n("hybrid"));
|
|
else
|
|
item->setText(3,i18n("unknown"));
|
|
selectdlg.ImportProfileListView->insertItem(item);
|
|
TQString RemoteNetDiv="/";
|
|
if (it->getRemoteNetAddr() == "")
|
|
{
|
|
it->setRemoteNetMask("");
|
|
RemoteNetDiv="";
|
|
}
|
|
item->setText(4,TQString(it->getRemoteNetAddr()+RemoteNetDiv+it->getRemoteNetMask()));
|
|
|
|
// std::cout << "insert profile into listview: " << name << std::endl;
|
|
}
|
|
}
|
|
bool ret = selectdlg.exec();
|
|
|
|
if (ret == true)
|
|
{
|
|
TQListViewItemIterator it2( selectdlg.ImportProfileListView );
|
|
for ( ; it2.current(); ++it2 )
|
|
{
|
|
if ( ( (TQCheckListItem*)it2.current() )->isOn() )
|
|
{
|
|
VpnAccountData *data=NULL;
|
|
it = 0;
|
|
for ( it = ImportedAccountList->first(); it; it = ImportedAccountList->next() )
|
|
{
|
|
if ( it->getName() == ( (TQCheckListItem*)it2.current() )->text() && ( (TQCheckListItem*)it2.current() )->isOn() )
|
|
{
|
|
data = it;
|
|
importCount++;
|
|
RetName=it->getName();
|
|
break;
|
|
}
|
|
}
|
|
AccountList->append(data);
|
|
saveOptions(true, data->getName());
|
|
}
|
|
}
|
|
if (selectdlg.OpenProfileManagerCheckBox->isChecked() && !ImportedAccountList->isEmpty())
|
|
openProfileManager=true;
|
|
}
|
|
else
|
|
{
|
|
KMessageBox::sorry ( 0, i18n ( "Import canceled." ) );
|
|
return false;
|
|
}
|
|
|
|
|
|
|
|
TQString msg="";
|
|
if (importCount > 0 )
|
|
msg = i18n("Import was successful. %1 profiles are imported.").arg(TQString::number(importCount));
|
|
else
|
|
msg = i18n("Import was canceled because no profiles are selected.").arg(TQString::number(importCount));
|
|
|
|
KMessageBox::information ( 0, msg,i18n("Import success") );
|
|
|
|
}
|
|
else
|
|
{
|
|
KMessageBox::error ( 0, i18n ( "Reading of \"%1\" has been failed!" ).arg ( filename ) );
|
|
return false;
|
|
}
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
bool KVpncConfig::importFritzboxConfig(TQString filename, TQString& RetName, bool& openProfileManager)
|
|
{
|
|
/*
|
|
// example of vpn config fritzbox user
|
|
version = {
|
|
revision = "$Revision: 1.30 $";
|
|
creatversion = "1.1";
|
|
}
|
|
|
|
|
|
pwcheck = {
|
|
}
|
|
|
|
|
|
datapipecfg = {
|
|
security = dpsec_quiet;
|
|
icmp = {
|
|
ignore_echo_requests = no;
|
|
destunreach_rate = {
|
|
burstfactor = 6;
|
|
timeout = 1;
|
|
}
|
|
timeexceeded_rate = {
|
|
burstfactor = 6;
|
|
timeout = 1;
|
|
}
|
|
echoreply_rate = {
|
|
burstfactor = 6;
|
|
timeout = 1;
|
|
}
|
|
}
|
|
masqtimeouts = {
|
|
tcp = 15m;
|
|
tcp_fin = 2m;
|
|
tcp_rst = 3s;
|
|
udp = 5m;
|
|
icmp = 30s;
|
|
got_icmp_error = 15s;
|
|
any = 5m;
|
|
tcp_connect = 6m;
|
|
tcp_listen = 2m;
|
|
}
|
|
ipfwlow = {
|
|
input = {
|
|
}
|
|
output = {
|
|
}
|
|
}
|
|
ipfwhigh = {
|
|
input = {
|
|
}
|
|
output = {
|
|
}
|
|
}
|
|
NAT_T_keepalive_interval = 20;
|
|
}
|
|
|
|
|
|
targets = {
|
|
policies = {
|
|
name = "My Fritzbox";
|
|
connect_on_channelup = no;
|
|
always_renew = no;
|
|
reject_not_encrypted = no;
|
|
dont_filter_netbios = yes;
|
|
localip = 0.0.0.0;
|
|
virtualip = 192.168.178.201;
|
|
remoteip = 0.0.0.0;
|
|
remotehostname = "dnyn.myfb.com";
|
|
localid = {
|
|
user_fqdn = "user@domain.com";
|
|
}
|
|
mode = mode_aggressive;
|
|
phase1ss = "all/all/all";
|
|
keytype = keytype_pre_shared;
|
|
key = "geheim";
|
|
cert_do_server_auth = no;
|
|
use_nat_t = yes;
|
|
use_xauth = no;
|
|
use_cfgmode = no;
|
|
phase2localid = {
|
|
ipaddr = 192.168.178.201;
|
|
}
|
|
phase2remoteid = {
|
|
ipnet = {
|
|
ipaddr = 192.168.178.0;
|
|
mask = 255.255.255.0;
|
|
}
|
|
}
|
|
phase2ss = "esp-all-all/ah-none/comp-all/pfs";
|
|
accesslist = "permit ip any 192.168.178.0 255.255.255.0";
|
|
wakeupremote = no;
|
|
}
|
|
}
|
|
|
|
|
|
policybindings = {
|
|
}
|
|
|
|
*/
|
|
TQFile importfile (filename);
|
|
if (!importfile.exists())
|
|
{
|
|
KMessageBox::error ( 0, i18n ( "Reading of \"%1\" has been failed!" ).arg ( filename ) );
|
|
return false;
|
|
}
|
|
if ( importfile.open(IO_ReadOnly))
|
|
{
|
|
TQString line = NULL;
|
|
VpnAccountData *profiledata = new VpnAccountData(VpnAccountData::freeswan,"fritzbox") ;
|
|
TQTextStream stream(&importfile);
|
|
bool datapipecfgFound = false;
|
|
bool policiesFound = false;
|
|
bool targetsFound = false;
|
|
bool localidFound = false;
|
|
bool phase2localidFound = false;
|
|
bool phase2remoteidFound = false;
|
|
bool ipnetFound = false;
|
|
bool nameFound = false;
|
|
|
|
profiledata->setDescription(TQString(i18n("import from ")+filename));
|
|
profiledata->setConnectionType( VpnAccountData::racoon);
|
|
profiledata->setUsePerfectForwardSecrety(true);
|
|
profiledata->setPerfectForwardSecrety("modp1024");
|
|
profiledata->setUseIkeGroup(true);
|
|
profiledata->setIkeGroup("modp1024");
|
|
profiledata->setIpsecIke("aes");
|
|
profiledata->setHashAlgo( "sha1");
|
|
profiledata->setUseAuthenticationAlgorithm(true);
|
|
profiledata->setEncryptionAlgorithm( "aes");
|
|
profiledata->setAuthenticationAlgorithm( "hmac_sha1" );
|
|
profiledata->setLocalIDType("user_fqdn");
|
|
profiledata->setReplaceDefaultRoute(false);
|
|
profiledata->setNetworkDevice("default");
|
|
profiledata->setUseDnsUpdate(false);
|
|
|
|
|
|
while ( !stream.atEnd() )
|
|
{
|
|
line = removeWhiteSpaceAtBegin(stream.readLine()).simplifyWhiteSpace();
|
|
if (KvpncDebugLevel > 6)
|
|
appendLogEntry(i18n ("import fritzbox config: line: %1").arg(line), debug);
|
|
|
|
if (line.startsWith("datapipecfg"))
|
|
{
|
|
datapipecfgFound = true;
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import fritzbox config: %1 found").arg("datapipecfg"), debug);
|
|
}
|
|
if (line.startsWith("policies"))
|
|
{
|
|
policiesFound = true;
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import fritzbox config: %1 found").arg("policies"), debug);
|
|
}
|
|
if (line.startsWith("targets"))
|
|
{
|
|
targetsFound = true;
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import fritzbox config: %1 found").arg("targets"), debug);
|
|
}
|
|
if (line.startsWith("localid"))
|
|
{
|
|
localidFound = true;
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import fritzbox config: %1 found").arg("localid"), debug);
|
|
}
|
|
if (line.startsWith("phase2localid"))
|
|
{
|
|
phase2localidFound = true;
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import fritzbox config: %1 found").arg("phase2localid"), debug);
|
|
}
|
|
if (line.startsWith("phase2remoteid"))
|
|
{
|
|
phase2remoteidFound = true;
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import fritzbox config: %1 found").arg("phase2remoteid"), debug);
|
|
}
|
|
if (line.startsWith("ipnet"))
|
|
{
|
|
ipnetFound = true;
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import fritzbox config: ipnetFound found"), debug);
|
|
}
|
|
if ( datapipecfgFound )
|
|
{
|
|
// here we can read masq timeouts, and so on.
|
|
}
|
|
if (targetsFound && policiesFound )
|
|
{
|
|
if (line.startsWith("name = "))
|
|
{
|
|
TQString ProfileName=line.section("= ",1,1).replace("\"","").replace(";","").replace(" ","_");
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("name").arg(ProfileName) ,debug);
|
|
profiledata->setName(ProfileName);
|
|
nameFound = true;
|
|
}
|
|
if (line.startsWith(" always_renew = "))
|
|
{
|
|
bool reconnectAfterConnectionLost=false;
|
|
if (line.section("= ",1,1).replace(";","") == "yes")
|
|
reconnectAfterConnectionLost = true;
|
|
if (KvpncDebugLevel > 2)
|
|
if (reconnectAfterConnectionLost)
|
|
appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("always_renew").arg(i18n("yes")) ,debug);
|
|
else
|
|
appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("always_renew").arg(i18n("no")) ,debug);
|
|
profiledata->setDoReconnectAfterConnectionLost(reconnectAfterConnectionLost);
|
|
}
|
|
if (line.startsWith("dont_filter_netbios = "))
|
|
{
|
|
bool dont_filter_netbios=false;
|
|
if (line.section("= ",1,1).replace(";","") == "yes")
|
|
dont_filter_netbios = true;
|
|
if (KvpncDebugLevel > 2)
|
|
if (dont_filter_netbios)
|
|
appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("dont_filter_netbios").arg(i18n("yes")) ,debug);
|
|
else
|
|
appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("dont_filter_netbios").arg(i18n("no")) ,debug);
|
|
// nothing to yet
|
|
}
|
|
if (line.startsWith("localip = "))
|
|
{
|
|
TQString LocalIp=line.section("= ",1,1).replace("\"","").replace(";","");
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("localip").arg(LocalIp) ,debug);
|
|
// nothing to do yet
|
|
}
|
|
if (line.startsWith("virtualip = "))
|
|
{
|
|
TQString LocalVirtualIp=line.section("= ",1,1).replace("\"","").replace(";","");
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("virtualip").arg(LocalVirtualIp) ,debug);
|
|
profiledata->setUseLeftSourceIp(true);
|
|
profiledata->setLeftSourceIp(LocalVirtualIp);
|
|
}
|
|
if (line.startsWith("remoteip = "))
|
|
{
|
|
TQString RemoteIp=line.section("= ",1,1).replace("\"","").replace(";","");
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("remoteip").arg(RemoteIp) ,debug);
|
|
// nothing to do yet
|
|
}
|
|
if (line.startsWith("remotehostname = "))
|
|
{
|
|
TQString Gateway=line.section("= ",1,1).replace("\"","").replace(";","");
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("remotehostname").arg(Gateway) ,debug);
|
|
profiledata->setGateway(Gateway);
|
|
}
|
|
if (localidFound)
|
|
{
|
|
if (line.startsWith("user_fqdn = "))
|
|
{
|
|
TQString LocalId=line.section("= ",1,1).replace("\"","").replace(";","");
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg(TQString("user_fqdn")+" ("+i18n("local id")+")").arg(LocalId) ,debug);
|
|
profiledata->setSpecialLocalID(LocalId);
|
|
profiledata->setUseSpecialLocalID(true);
|
|
profiledata->setLocalIDType("user_fqdn");
|
|
localidFound = false;
|
|
}
|
|
}
|
|
if (line.startsWith("mode = "))
|
|
{
|
|
TQString IpsecExchangeMode=line.section("= ",1,1).replace(";","");
|
|
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg(i18n("exchange mode")).arg(IpsecExchangeMode) ,debug);
|
|
|
|
if (IpsecExchangeMode == "mode_aggressive")
|
|
profiledata->setExchangeMode("aggressive");
|
|
else
|
|
profiledata->setExchangeMode("main");
|
|
}
|
|
if (line.startsWith("keytype = "))
|
|
{
|
|
TQString AuthType=line.section("= ",1,1).replace(";","");
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("keytype").arg(AuthType) ,debug);
|
|
|
|
if (AuthType == "keytype_pre_shared")
|
|
profiledata->setAuthType(VpnAccountData::psk);
|
|
else
|
|
profiledata->setAuthType(VpnAccountData::cert);
|
|
}
|
|
if (line.startsWith("key = "))
|
|
{
|
|
TQString PreshardKey=line.section("= ",1,1).replace("\"","").replace(";","");
|
|
if (KvpncDebugLevel > 2 && KvpncDebugLevel < 5)
|
|
appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("key").arg("******") ,debug);
|
|
if (KvpncDebugLevel > 5)
|
|
appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("key").arg(PreshardKey) ,debug);
|
|
profiledata->setPreSharedKey(PreshardKey);
|
|
profiledata->setPskIsInFile(false);
|
|
}
|
|
if (line.startsWith("cert_do_server_auth = "))
|
|
{
|
|
bool cert_do_server_auth=false;
|
|
if (line.section("= ",1,1).replace(";","") == "yes")
|
|
cert_do_server_auth = true;
|
|
if (KvpncDebugLevel > 2)
|
|
if (cert_do_server_auth)
|
|
appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("cert_do_server_auth").arg(i18n("yes")) ,debug);
|
|
else
|
|
appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("cert_do_server_auth").arg(i18n("no")) ,debug);
|
|
// nothing to to yet
|
|
}
|
|
if (line.startsWith("use_nat_t = "))
|
|
{
|
|
bool UseNat=false;
|
|
if (line.section("= ",1,1).replace(";","") == "yes")
|
|
UseNat = true;
|
|
if (KvpncDebugLevel > 2)
|
|
if (UseNat)
|
|
appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("use_nat_t").arg(i18n("yes")) ,debug);
|
|
else
|
|
appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("use_nat_t").arg(i18n("no")) ,debug);
|
|
profiledata->setUseNat(UseNat);
|
|
profiledata->setUseUdp(true);
|
|
}
|
|
if (line.startsWith("use_xauth = "))
|
|
{
|
|
bool UseXauth=false;
|
|
if (line.section("= ",1,1).replace(";","") == "yes")
|
|
UseXauth = true;
|
|
if (KvpncDebugLevel > 2)
|
|
if (UseXauth)
|
|
appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("use_xauth").arg(i18n("yes")) ,debug);
|
|
else
|
|
appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("use_xauth").arg(i18n("no")) ,debug);
|
|
profiledata->setAuthWithUsernameAndPassword(UseXauth);
|
|
}
|
|
if (line.startsWith("use_cfgmode = "))
|
|
{
|
|
bool ModeConfig=false;
|
|
if (line.section("= ",1,1).replace(";","") == "yes")
|
|
ModeConfig = true;
|
|
if (KvpncDebugLevel > 2)
|
|
if (ModeConfig)
|
|
appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("use_cfgmode").arg(i18n("yes")) ,debug);
|
|
else
|
|
appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("use_cfgmode").arg(i18n("no")) ,debug);
|
|
profiledata->setUseModeConfig(ModeConfig);
|
|
}
|
|
if (phase2localidFound)
|
|
{
|
|
if (line.startsWith("ipaddr = "))
|
|
{
|
|
TQString Phase2LocalId=line.section("= ",1,1).replace("\"","").replace(";","");
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg(i18n("ip addr for phase 2")).arg(Phase2LocalId) ,debug);
|
|
// nothing to do yet
|
|
}
|
|
}
|
|
if (phase2remoteidFound && ipnetFound)
|
|
{
|
|
profiledata->setUseRemoteNetwork(true);
|
|
if (line.startsWith("ipaddr = "))
|
|
{
|
|
TQString RemoteNetWorkAddr=line.section("= ",1,1).replace(";","");
|
|
if (KvpncDebugLevel > 2)
|
|
appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg(i18n("remote network ip")).arg(RemoteNetWorkAddr) ,debug);
|
|
profiledata->setRemoteNetAddr(RemoteNetWorkAddr);
|
|
}
|
|
if (line.startsWith("mask = "))
|
|
{
|
|
TQString RemoteNetWorkMask=line.section("= ",1,1).replace(";","");
|
|
TQString RemoteNetWorkMaskNumeric = TQString().setNum(Utils(this).dottedIpv4Netmask2NetmaskBytes(RemoteNetWorkMask));
|
|
if (KvpncDebugLevel > 2)
|
|
{
|
|
appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg(i18n("remote network netmask")).arg(RemoteNetWorkMask) ,debug);
|
|
|
|
appendLogEntry(i18n("Netmask (dotted): %1, numeric value: %2").arg(RemoteNetWorkMask).arg(RemoteNetWorkMaskNumeric), debug);
|
|
}
|
|
profiledata->setRemoteNetMask(RemoteNetWorkMaskNumeric);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
if (policiesFound && nameFound)
|
|
{
|
|
|
|
bool ok = false;
|
|
VpnAccountData * it;
|
|
bool nameOk = false;
|
|
while ( nameOk == false )
|
|
{
|
|
for ( it = AccountList->first(); it; it = AccountList->next() )
|
|
{
|
|
if ( it->getName() == profiledata->getName() )
|
|
{
|
|
//account->setName( TQString( account->getName() + "_2" ) );
|
|
// KMessageBox::information ( this, i18n( "Profile name exists!\n It will be renamed to \"%1\"." ).arg( account->getName() ), i18n( "Name exist, renamed" ) );
|
|
KMessageBox::error ( 0, i18n ( "Profile name exists!" ), i18n ( "Name Exists" ) );
|
|
nameOk = false;
|
|
TQString newName = KInputDialog::getText ( i18n ( "New Name" ), i18n ( "New name for profile:" ), TQString ( profiledata->getName() + "_2" ), &ok );
|
|
if (newName.isEmpty())
|
|
{
|
|
KMessageBox::information ( 0, i18n ( "Import was canceled." ) );
|
|
appendLogEntry ( i18n ( "Import was canceled." ), info );
|
|
return false;
|
|
}
|
|
if (newName != it->getName() )
|
|
{
|
|
profiledata->setName ( newName );
|
|
nameOk = true;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
nameOk = true;
|
|
}
|
|
}
|
|
}
|
|
|
|
if ( nameOk == true )
|
|
{
|
|
AccountList->append(profiledata);
|
|
RetName = profiledata->getName();
|
|
saveOptions(true, RetName);
|
|
appendLogEntry ( i18n ( "Import of \"%1\" (%2) was successful." ).arg ( profiledata->getName() ).arg ( "Fritzbox" ), info );
|
|
|
|
TQString bin = "racoon";
|
|
ToolInfo *tool;
|
|
//std::cout << "Tool (bin): " << bin << std::endl;
|
|
if ( !ToolList->isEmpty() )
|
|
{
|
|
for ( tool = ToolList->first(); tool; tool = ToolList->next() )
|
|
{
|
|
if ( bin == tool->Name )
|
|
{
|
|
if ( tool->PathToExec.section ( '/', -1 ) != bin )
|
|
{
|
|
// program is NOT installed
|
|
KMessageBox::information ( 0, i18n ( "The required tool (%1) is not installed, please install it before you are connecting and restart kvpnc." ).arg ( bin ), i18n ( "Tool Missing" ) );
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
KMessageBox::information ( 0, i18n ( "Import was canceled." ) );
|
|
appendLogEntry ( i18n ( "Import was canceled." ), info );
|
|
return false;
|
|
}
|
|
|
|
}
|
|
TQString msg="";
|
|
if (policiesFound && nameFound)
|
|
msg = i18n("Import was successful. 1 profile was imported.");
|
|
else
|
|
msg = i18n("Import was canceled because no profile was found.");
|
|
|
|
KMessageBox::information ( 0, msg,i18n("Import success") );
|
|
return policiesFound && nameFound;
|
|
}
|
|
else
|
|
{
|
|
KMessageBox::error ( 0, i18n ( "Reading of \"%1\" has been failed!" ).arg ( filename ) );
|
|
return false;
|
|
}
|
|
return true;
|
|
|
|
}
|
|
|
|
VpnAccountData* KVpncConfig::findProfile(TQPtrList<VpnAccountData> *list,const TQString& Name)
|
|
{
|
|
VpnAccountData *it=NULL;
|
|
bool found=false;
|
|
if ( !list->isEmpty() )
|
|
{
|
|
for ( it = list->first(); it; it = list->next() )
|
|
{
|
|
// std::cout << "findProfile(): it: " << it->getName() << " Name: " << Name << std::endl;
|
|
if (Name == it->getName())
|
|
{
|
|
found=true;
|
|
// std::cout << "findProfile(): profile found." << std::endl;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
if (found)
|
|
return it;
|
|
else
|
|
{
|
|
// std::cout << "findProfile(): profile not found." << std::endl;
|
|
return NULL;
|
|
}
|
|
}
|
|
|
|
TQString KVpncConfig::removeWhiteSpaceAtBegin(const TQString str)
|
|
{
|
|
TQString newstr="";
|
|
int i=0;
|
|
for (i=0;i<(int)str.length();i++)
|
|
{
|
|
if (!TQChar(str.at(i)).isSpace())
|
|
break;
|
|
}
|
|
newstr = str.right(str.length()-i);
|
|
return newstr;
|
|
}
|
|
|
|
void KVpncConfig::doBackupConfig()
|
|
{
|
|
TDEStandardDirs * dirs = TDEGlobal::dirs();
|
|
TQString config = TQString(dirs->saveLocation( "config" )+"/kvpncrc");
|
|
TQFile OriginalConfFile( config );
|
|
TQFile backupOriginalConfFile( config+".backup" );
|
|
TQTextStream writestream( &backupOriginalConfFile );
|
|
TQTextStream readstream( &OriginalConfFile );
|
|
if ( OriginalConfFile.open( IO_ReadOnly ) )
|
|
{
|
|
if (backupOriginalConfFile.open(IO_WriteOnly))
|
|
{
|
|
TQString OriginalConfFileContent = TQString( OriginalConfFile.readAll() ) ;
|
|
writestream << OriginalConfFileContent;
|
|
OriginalConfFile.close();
|
|
backupOriginalConfFile.close();
|
|
}
|
|
}
|
|
}
|
|
|
|
void KVpncConfig::restoreBackupConfig()
|
|
{
|
|
TDEStandardDirs * dirs = TDEGlobal::dirs();
|
|
TQString config = TQString(dirs->saveLocation( "config" )+"/kvpncrc");
|
|
TQFile OriginalConfFile( config+".backup" );
|
|
TQFile backupOriginalConfFile( config );
|
|
TQTextStream writestream( &backupOriginalConfFile );
|
|
TQTextStream readstream( &OriginalConfFile );
|
|
if ( OriginalConfFile.open( IO_ReadOnly ) )
|
|
{
|
|
if (backupOriginalConfFile.open(IO_WriteOnly))
|
|
{
|
|
TQString OriginalConfFileContent = TQString( OriginalConfFile.readAll() ) ;
|
|
writestream << OriginalConfFileContent;
|
|
OriginalConfFile.close();
|
|
backupOriginalConfFile.close();
|
|
}
|
|
}
|
|
}
|
|
|
|
void KVpncConfig::getToolsInfo()
|
|
{
|
|
ToolInfo *it;
|
|
//std::cout << "Tool (bin): " << bin << std::endl;
|
|
if (!ToolList->isEmpty())
|
|
{
|
|
for ( it = ToolList->first(); it; it = ToolList->next() )
|
|
{
|
|
it->collectToolInfo();
|
|
}
|
|
}
|
|
}
|
|
|
|
void KVpncConfig::removeEntry(TQString Name)
|
|
{
|
|
TDEStandardDirs * dirs = TDEGlobal::dirs();
|
|
TQString filePath = dirs->findResource ( "config", "kvpncrc" );
|
|
|
|
appPointer->processEvents();
|
|
|
|
if (useTDEwallet && TDEWallet::Wallet::isEnabled())
|
|
config->deleteEntry( "First use of TDEwallet", false );
|
|
/* = user data = */
|
|
VpnAccountData *it;
|
|
if ( !AccountList->isEmpty() )
|
|
{
|
|
for ( it = AccountList->first(); it; it = AccountList->next() )
|
|
{
|
|
if ( !it->getName().isEmpty() )
|
|
{
|
|
TQString name = it->getName();
|
|
if (it->getName() == Name)
|
|
{
|
|
//std::cout << "Remove profile: " << it->getName() << std::endl;
|
|
TQString ProfileName = "Profile_";
|
|
ProfileName += name;
|
|
config->setGroup( ProfileName );
|
|
|
|
/* passwords with tdewallet */
|
|
if ( useTDEwallet && TDEWallet::Wallet::isEnabled())
|
|
{
|
|
// if (KvpncDebugLevel > 0)
|
|
// appendLogEntry(i18n( "Wallet enabled and available, writing to wallet." ),debug);
|
|
// // Open local wallet
|
|
wallet = TDEWallet::Wallet::openWallet(TDEWallet::Wallet::LocalWallet());
|
|
if (wallet != 0)
|
|
{
|
|
TQString walletname="kvpnc";
|
|
// Check if folder exists, otherwise create it
|
|
bool walletOK=true;
|
|
if (!wallet->hasFolder(walletname))
|
|
{
|
|
walletOK = wallet->createFolder(walletname);
|
|
wallet->sync();
|
|
}
|
|
if (walletOK)
|
|
{
|
|
wallet->setFolder(walletname);
|
|
//std::cout << "[set] account: " << ProfileName << ", loginname: " << loginname << ", password: " << pwd << std::endl;
|
|
bool UserPasswordOK = (wallet->removeEntry (TQString(name+"__user_pw")) == 0);
|
|
bool PskOK= (wallet->removeEntry (TQString(name+"__psk")) == 0);
|
|
bool PskKeyPassOK = (wallet->removeEntry (TQString(name+"__priv_key_pwd")) == 0);
|
|
// wallet->sync();
|
|
|
|
if (KvpncDebugLevel > 2)
|
|
{
|
|
if (UserPasswordOK)
|
|
appendLogEntry(i18n( "delete of %1 was ok." ).arg(i18n("user password")), debug);
|
|
else
|
|
appendLogEntry(i18n( "delete of %1 has failed." ).arg(i18n("user password")), debug);
|
|
//
|
|
if (PskOK)
|
|
appendLogEntry(i18n( "delete of %1 was successful." ).arg(i18n("preshared key")), debug);
|
|
else
|
|
appendLogEntry(i18n( "delete of %1 has failed." ).arg(i18n("preshared key")),debug);
|
|
|
|
if (PskKeyPassOK)
|
|
appendLogEntry(i18n( "delete of %1 was successful." ).arg(i18n("private key password")), debug);
|
|
else
|
|
appendLogEntry(i18n( "delete of %1 has failed." ).arg(i18n("private key password")),debug);
|
|
|
|
|
|
// //std::cout << "success: " << pwdOK << std::endl;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
KMessageBox::error( 0, i18n( "Unable to create wallet folder for kvpnc!" ) );
|
|
appendLogEntry(i18n( "Unable to create wallet folder for kvpnc!" ), error);
|
|
}
|
|
}
|
|
}
|
|
if (KvpncDebugLevel > 0)
|
|
appendLogEntry(i18n( "Wallet disabled or not available, writing to config file." ),debug);
|
|
// write passwords to config file :|
|
|
config->deleteEntry( "User password" );
|
|
config->deleteEntry( "Pre shared key" );
|
|
config->deleteEntry( "PrivateKey password" );
|
|
// }
|
|
|
|
config->deleteEntry( "Connection type" );
|
|
config->deleteEntry( "VPN Gateway" );
|
|
config->deleteEntry( "VPN ID" );
|
|
config->deleteEntry( "Username" );
|
|
config->deleteEntry( "Save user password" );
|
|
config->deleteEntry( "Save PSK" );
|
|
config->deleteEntry( "Private key" );
|
|
config->deleteEntry( "Use advanced settings" );
|
|
config->deleteEntry( "Application version" );
|
|
config->deleteEntry( "Local port" );
|
|
config->deleteEntry( "NT domain name" );
|
|
config->deleteEntry( "Perfect forward secrety" );
|
|
config->deleteEntry( "IKE group" );
|
|
config->deleteEntry( "Use application version" );
|
|
config->deleteEntry( "Use global IPSec secret" );
|
|
config->deleteEntry( "Use IKE group" );
|
|
config->deleteEntry( "Use local port" );
|
|
config->deleteEntry( "Use NT domain name" );
|
|
config->deleteEntry( "Use single DES" );
|
|
config->deleteEntry( "Use perfect Forward Secrety" );
|
|
config->deleteEntry( "Remote net address" );
|
|
config->deleteEntry( "Remote net mask" );
|
|
config->deleteEntry( "x509 certificate" );
|
|
config->deleteEntry( "Ca certificate" );
|
|
config->deleteEntry( "Network device" );
|
|
config->deleteEntry( "Cert path" );
|
|
config->deleteEntry( "Auth type");
|
|
config->deleteEntry( "do ping ip" );
|
|
config->deleteEntry( "Ping host IP" );
|
|
config->deleteEntry( "Use special remote ID" );
|
|
config->deleteEntry( "Special server certificate" );
|
|
config->deleteEntry( "Use special server certificate" );
|
|
config->deleteEntry( "Special remote ID" );
|
|
config->deleteEntry( "Use UDP-protocol" );
|
|
config->deleteEntry( "Use UDP-port" );
|
|
config->deleteEntry( "local UDP port" );
|
|
config->deleteEntry( "use DNS_UPDATE" );
|
|
config->deleteEntry( "use DNS-server" );
|
|
config->deleteEntry( "DNS server" );
|
|
config->deleteEntry( "get dns server from peer" );
|
|
config->deleteEntry( "refuse 40 bit encryption" );
|
|
|
|
appPointer->processEvents();
|
|
|
|
config->deleteEntry( "refuse 128 bit encryption" );
|
|
config->deleteEntry( "require stateless encryption" );
|
|
config->deleteEntry( "require mppe" );
|
|
config->deleteEntry( "Disable MPPE compression" );
|
|
config->deleteEntry( "Local virtual IP" );
|
|
config->deleteEntry( "Remote virtual IP" );
|
|
config->deleteEntry( "Pre shared key file" );
|
|
config->deleteEntry( "Execute command before connect" );
|
|
config->deleteEntry( "Execute command after connect" );
|
|
config->deleteEntry( "Execute command before disconnect" );
|
|
config->deleteEntry( "Execute command after disconnect" );
|
|
config->deleteEntry( "Command before connect" );
|
|
config->deleteEntry( "Command after connect" );
|
|
config->deleteEntry( "Command before disconnect" );
|
|
config->deleteEntry( "Command after disconnect" );
|
|
config->deleteEntry( "Use no BSD compression" );
|
|
config->deleteEntry( "Use no deflate" );
|
|
config->deleteEntry( "Set default route" );
|
|
config->deleteEntry( "Replace default route" );
|
|
config->deleteEntry( "Use own MTU" );
|
|
config->deleteEntry( "Use own MRU" );
|
|
config->deleteEntry( "MTU for pppd" );
|
|
config->deleteEntry( "MRU for pppd" );
|
|
config->deleteEntry( "Use Virtual IP" );
|
|
config->deleteEntry( "Virtual IP" );
|
|
config->deleteEntry( "PSK is in file" );
|
|
config->deleteEntry( "Use additional network routes" );
|
|
config->deleteEntry( "Hash algorithm" );
|
|
config->deleteEntry( "Tunnel device type" );
|
|
config->deleteEntry( "Use userdefined port" );
|
|
config->deleteEntry( "Userdefined port" );
|
|
config->deleteEntry( "Keep default route" );
|
|
config->deleteEntry( "Additional network routes" );
|
|
config->deleteEntry("AuthWithUsernameAndPassword" );
|
|
config->deleteEntry("AllowEmptyGroupPassword" );
|
|
config->deleteEntry("Encryption algorithm");
|
|
config->deleteEntry("Authentication algorithm");
|
|
|
|
config->deleteGroup( ProfileName );
|
|
|
|
/* give info */
|
|
//slotStatusMsg ( i18n( "Profile \"%1\" removed." ).arg( Name ), ID_FLASH_MSG );
|
|
appendLogEntry ( i18n( "Profile \"%1\" removed." ).arg( Name ) , info);
|
|
AccountList->remove(it);
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
appPointer->processEvents();
|
|
}
|
|
config->sync();
|
|
appPointer->processEvents();
|
|
}
|
|
|