From 1e0dd58661c9097fb41218ee7e3515f2d8ba8dac Mon Sep 17 00:00:00 2001 From: tpearson Date: Mon, 17 Oct 2011 17:38:53 +0000 Subject: Add dead-ended knetworkmanager 0.8 source Add copy of same for knetworkmanager 0.9 starting point git-svn-id: svn://anonsvn.kde.org/home/kde/branches/trinity/applications/knetworkmanager8@1259314 283d02a7-25f6-0310-bc7c-ecb5cbfe19da --- knetworkmanager-0.8/vpn-plugins/vpnc/AUTHORS | 2 + knetworkmanager-0.8/vpn-plugins/vpnc/Makefile.am | 5 + .../vpn-plugins/vpnc/configure.in.in | 14 + .../vpn-plugins/vpnc/knetworkmanager_vpnc.desktop | 23 ++ .../vpn-plugins/vpnc/src/Makefile.am | 12 + .../vpn-plugins/vpnc/src/knetworkmanager-vpnc.cpp | 402 +++++++++++++++++++++ .../vpn-plugins/vpnc/src/knetworkmanager-vpnc.h | 89 +++++ .../vpn-plugins/vpnc/src/vpncauth.ui | 68 ++++ .../vpn-plugins/vpnc/src/vpncprop.ui | 279 ++++++++++++++ 9 files changed, 894 insertions(+) create mode 100644 knetworkmanager-0.8/vpn-plugins/vpnc/AUTHORS create mode 100644 knetworkmanager-0.8/vpn-plugins/vpnc/Makefile.am create mode 100644 knetworkmanager-0.8/vpn-plugins/vpnc/configure.in.in create mode 100644 knetworkmanager-0.8/vpn-plugins/vpnc/knetworkmanager_vpnc.desktop create mode 100644 knetworkmanager-0.8/vpn-plugins/vpnc/src/Makefile.am create mode 100644 knetworkmanager-0.8/vpn-plugins/vpnc/src/knetworkmanager-vpnc.cpp create mode 100644 knetworkmanager-0.8/vpn-plugins/vpnc/src/knetworkmanager-vpnc.h create mode 100644 knetworkmanager-0.8/vpn-plugins/vpnc/src/vpncauth.ui create mode 100644 knetworkmanager-0.8/vpn-plugins/vpnc/src/vpncprop.ui (limited to 'knetworkmanager-0.8/vpn-plugins/vpnc') diff --git a/knetworkmanager-0.8/vpn-plugins/vpnc/AUTHORS b/knetworkmanager-0.8/vpn-plugins/vpnc/AUTHORS new file mode 100644 index 0000000..e0ecfce --- /dev/null +++ b/knetworkmanager-0.8/vpn-plugins/vpnc/AUTHORS @@ -0,0 +1,2 @@ +Helmut Schaa , +Thomas Kallenberg diff --git a/knetworkmanager-0.8/vpn-plugins/vpnc/Makefile.am b/knetworkmanager-0.8/vpn-plugins/vpnc/Makefile.am new file mode 100644 index 0000000..008e246 --- /dev/null +++ b/knetworkmanager-0.8/vpn-plugins/vpnc/Makefile.am @@ -0,0 +1,5 @@ +SUBDIRS = src + +service_DATA = knetworkmanager_vpnc.desktop +servicedir = $(kde_servicesdir) + diff --git a/knetworkmanager-0.8/vpn-plugins/vpnc/configure.in.in b/knetworkmanager-0.8/vpn-plugins/vpnc/configure.in.in new file mode 100644 index 0000000..7deec5d --- /dev/null +++ b/knetworkmanager-0.8/vpn-plugins/vpnc/configure.in.in @@ -0,0 +1,14 @@ +KNETWORKMANAGER_VPNC_VERSION=0.1 +AC_DEFINE_UNQUOTED(KNETWORKMANAGER_VPNC_VERSION, $KNETWORKMANAGER_VPNC_VERSION, [KNetworkManager VPNC Plugin Version]) +AC_DEFINE_UNQUOTED(KNETWORKMANAGER_VPNC_VERSION_STRING, "$KNETWORKMANAGER_VPNC_VERSION", [KNetworkManager VPNC Plugin Version String]) + +PKG_CHECK_MODULES(DBUS_TQT, [dbus-1-tqt >= 0.8.1], [], [ + AC_MSG_RESULT([no]) + AC_MSG_ERROR([TQT dbus bindings missing]) +]) + +VPNC_CFLAGS="$DBUS_TQT_CFLAGS" +VPNC_LIBS="$DBUS_TQT_LIBS" + +AC_SUBST(VPNC_CFLAGS) +AC_SUBST(VPNC_LIBS) diff --git a/knetworkmanager-0.8/vpn-plugins/vpnc/knetworkmanager_vpnc.desktop b/knetworkmanager-0.8/vpn-plugins/vpnc/knetworkmanager_vpnc.desktop new file mode 100644 index 0000000..6b9ce96 --- /dev/null +++ b/knetworkmanager-0.8/vpn-plugins/vpnc/knetworkmanager_vpnc.desktop @@ -0,0 +1,23 @@ +[Desktop Entry] +Encoding=UTF-8 +Type=Service +Icon= +ServiceTypes=KNetworkManager/VPNPlugin +X-KDE-Library=knetworkmanager_vpnc +X-NetworkManager-Services=vpnc +X-KDE-PluginInfo-Author=Helmut Schaa +X-KDE-PluginInfo-Email=hschaa@suse.de +X-KDE-PluginInfo-Name=knetworkmanager_vpnc +X-KDE-PluginInfo-Version=0.1 +X-KDE-PluginInfo-Website= +X-KDE-PluginInfo-Category=VPNService +X-KDE-PluginInfo-Depends= +X-KDE-PluginInfo-License=GPL +X-KDE-PluginInfo-EnabledByDefault=false +Name=VPNC +Name[bn]=ভিপিএনসি +Name[xx]=xxVPNCxx +Comment=VPNC +Comment[bn]=ভিপিএনসি +Comment[xx]=xxVPNCxx + diff --git a/knetworkmanager-0.8/vpn-plugins/vpnc/src/Makefile.am b/knetworkmanager-0.8/vpn-plugins/vpnc/src/Makefile.am new file mode 100644 index 0000000..331b9f6 --- /dev/null +++ b/knetworkmanager-0.8/vpn-plugins/vpnc/src/Makefile.am @@ -0,0 +1,12 @@ +INCLUDES = $(KNETWORKMANAGER_CFLAGS) $(VPNC_CFLAGS) $(all_includes) + +METASOURCES = AUTO + +kde_module_LTLIBRARIES = knetworkmanager_vpnc.la +knetworkmanager_vpnc_la_SOURCES = knetworkmanager-vpnc.cpp \ + vpncprop.ui \ + vpncauth.ui +noinst_HEADERS = knetworkmanager-vpnc.h +knetworkmanager_vpnc_la_LDFLAGS = -module $(all_libraries) +knetworkmanager_vpnc_la_LIBADD = $(LIB_KDEUI) $(LIB_KDECORE) $(LIB_QT) + diff --git a/knetworkmanager-0.8/vpn-plugins/vpnc/src/knetworkmanager-vpnc.cpp b/knetworkmanager-0.8/vpn-plugins/vpnc/src/knetworkmanager-vpnc.cpp new file mode 100644 index 0000000..526d5d5 --- /dev/null +++ b/knetworkmanager-0.8/vpn-plugins/vpnc/src/knetworkmanager-vpnc.cpp @@ -0,0 +1,402 @@ +/*************************************************************************** + * + * knetworkmanager-vpnc.cpp - A NetworkManager frontend for KDE + * + * Copyright (C) 2006 Novell, Inc. + * + * Author: Helmut Schaa , + * Author: Timothy Pearson + * + * This program is free software; you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation; either version 2 of the License, or + * (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program; if not, write to the Free Software + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA + * + **************************************************************************/ + +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include + +#include "knetworkmanager-vpnc.h" +using namespace std; + +typedef KGenericFactory VPNCPluginFactory; +K_EXPORT_COMPONENT_FACTORY( knetworkmanager_vpnc, VPNCPluginFactory("knetworkmanager_vpnc")); + +#define NAT_MODE_CISCO 0 +#define NAT_MODE_NATT 1 +#define NAT_MODE_DISABLED 2 + +char linedata [2048]; + +VPNCPlugin::VPNCPlugin(TQObject* parent, const char* name, const TQStringList& args) + : VPNPlugin(parent, name, args) +{ + KLocale* loc = KGlobal::locale(); + loc->insertCatalogue("NetworkManager-vpnc"); +} + +VPNCPlugin::~VPNCPlugin() +{ + +} + +VPNConfigWidget* VPNCPlugin::CreateConfigWidget(TQWidget* parent) +{ + return new VPNCConfig(parent); +} + +VPNAuthenticationWidget* VPNCPlugin::CreateAuthenticationWidget(TQWidget* parent) +{ + return new VPNCAuthentication(parent); +} + + +VPNCConfig::VPNCConfig(TQWidget* parent) + : VPNConfigWidget(parent) +{ + TQVBoxLayout* tqlayout = new TQVBoxLayout(this, 1, 1); + _vpncWidget = new VPNCConfigWidget(this); + tqlayout->addWidget(_vpncWidget); + + connect(_vpncWidget->pcfImport, TQT_SIGNAL(clicked()), this, TQT_SLOT( pcfImport()) ); + + //connect(_vpncWidget->chkOverrideUsername, TQT_SIGNAL(toggled(bool)), _vpncWidget->Xauth_username, TQT_SLOT(setEnabled(bool))); + //connect(_vpncWidget->chkOverrideUsername, TQT_SIGNAL(toggled(bool)), _vpncWidget->lblUsername, TQT_SLOT(setEnabled(bool))); + + connect(_vpncWidget->chkUseDomain, TQT_SIGNAL(toggled(bool)), _vpncWidget->Domain, TQT_SLOT(setEnabled(bool))); + connect(_vpncWidget->chkUseDomain, TQT_SIGNAL(toggled(bool)), _vpncWidget->lblDomain, TQT_SLOT(setEnabled(bool))); + + connect(_vpncWidget->chkIPAdresses, TQT_SIGNAL(toggled(bool)), _vpncWidget->routes, TQT_SLOT(setEnabled(bool))); + + connect(_vpncWidget->chkUseKeepAlive, TQT_SIGNAL(toggled(bool)), _vpncWidget->nat_keep_alive_interval, TQT_SLOT(setEnabled(bool))); + connect(_vpncWidget->chkUseKeepAlive, TQT_SIGNAL(toggled(bool)), _vpncWidget->lblKeepAliveInterval, TQT_SLOT(setEnabled(bool))); + + _vpncWidget->cboNAT->insertItem(i18n("Cisco UDP (default)"), NAT_MODE_CISCO); + _vpncWidget->cboNAT->insertItem(i18n("NAT-T"), NAT_MODE_NATT); + _vpncWidget->cboNAT->insertItem(i18n("Disabled"), NAT_MODE_DISABLED); + + this->languageChange(); +} + +VPNCConfig::~VPNCConfig() +{ + +} + +void VPNCConfig::languageChange() +{ + +} + +int VPNCConfig::getFileConfig(char *parameter, char *line) { + int i; + + if (strstr(line, parameter) != NULL) { + if ((strstr(line, parameter) - line) == 0) { + for (i=0; i<(strlen(line)-strlen(parameter));i++) { + linedata[i] = line[i+strlen(parameter)]; + if ((linedata[i] == 10) || (linedata[i] == 13)) { + linedata[i] = 0; + } + } + linedata[i-1]=0; + + return 0; + } + else { + return 1; + } + } + else { + return 1; + } +} + +void VPNCConfig::pcfImport() +{ + const TQString& pcf_file = TQString(_vpncWidget->editPCF->url()); + printf("Asked for PCF import from file %s\n\r", pcf_file.ascii()); + int i; + + FILE *file = fopen ( pcf_file.ascii(), "r" ); + if ( file != NULL ) { + char line [2048]; // or other suitable maximum line size + // read a line + while ( fgets ( line, sizeof line, file ) != NULL ) { + // Parse the line and update global variables (current line in variable "line") + if (getFileConfig("Host=", line) == 0) { + //strdup(linedata) + printf("Got configuration parameter Host with data %s\n\r", linedata); + _vpncWidget->IPSec_gateway->setText(linedata); + } + if (getFileConfig("GroupName=", line) == 0) { + printf("Got configuration parameter GroupName with data %s\n\r", linedata); + _vpncWidget->IPSec_ID->setText(linedata); + } +// if (getFileConfig("TcpTunnelingPort=", line) == 0) { +// printf("Got configuration parameter TcpTunnelingPort with data %s\n\r", linedata); +// _vpncWidget->IPSec_ID->setText(linedata); +// } + if (getFileConfig("NTDomain=", line) == 0) { + if (strlen(linedata) > 0) { + printf("Got configuration parameter NTDomain with data %s\n\r", linedata); + _vpncWidget->Domain->setText(linedata); + _vpncWidget->chkUseDomain->setChecked(true); + } + } + if (getFileConfig("GroupPwd=", line) == 0) { + if (strlen(linedata) > 0) { + printf("Got configuration parameter GroupPwd with data %s\n\r", linedata); + KMessageBox::information(this, TQString("Your group password is: %1\n\r\n\rYou will need this information when you log on").tqarg(linedata)); + } + } + if (getFileConfig("enc_GroupPwd=", line) == 0) { + if (strlen(linedata) > 0) { + printf("Got configuration parameter enc_GroupPwd with data %s\n\r", linedata); + + // Decrypt the obfusticated password with /usr/lib/vpnc/cisco-decrypt + string decryptcommand="/usr/lib/vpnc/cisco-decrypt "; + FILE *pipe_decrypt; + char decrypted_result[2048]; + int i; + + decryptcommand.append(linedata); + printf("Group password decrypt command: %s\n\r", decryptcommand.c_str()); + if ((pipe_decrypt = popen(decryptcommand.c_str(), "r")) == NULL) + { + printf("Group password decrypt error\n\r"); + } + else { + fgets(decrypted_result, 2048, pipe_decrypt); + pclose(pipe_decrypt); + for (i=0;i<2048;i++) { + if (decrypted_result[i] == 0) { + decrypted_result[i-1]=0; + i=2048; + } + } + printf("Group password decrypt result: '%s'\n\r", decrypted_result); + } + KMessageBox::information(this, TQString("Your group password is: %1\n\r\n\rYou will need this information when you log on").tqarg(decrypted_result)); + } + } + } + fclose ( file ); + } + else + { + //printf("[WARN] Unable to open configuration file %s\n\r", pcf_file.ascii()); + KMessageBox::error(this, i18n("That configuration file does not exist!")); + } +} + +void VPNCConfig::setVPNData(const TQStringList& routes, const TQMap& properties) +{ + // fill up our inputfields (only textfields atm) + for(TQMap::ConstIterator it = properties.begin(); it != properties.end(); ++it) + { + TQString entry = it.key(); + TQString value = it.data(); + + if (entry == "IPSec gateway") + { + _vpncWidget->IPSec_gateway->setText(value); + } + else if (entry == "IPSec ID") + { + _vpncWidget->IPSec_ID->setText(value); + } + else if (entry == "Xauth username") + { + _vpncWidget->Xauth_username->setText(value); + //_vpncWidget->chkOverrideUsername->setChecked(true); + } + else if (entry == "Domain") + { + _vpncWidget->Domain->setText(value); + _vpncWidget->chkUseDomain->setChecked(true); + } + else if (entry == "NAT-Keepalive packet interval") + { + _vpncWidget->nat_keep_alive_interval->setText(value); + _vpncWidget->chkUseKeepAlive->setChecked(true); + } + // backwards compatibility + else if (entry == "Disable NAT Traversal") + { + _vpncWidget->cboNAT->setCurrentItem(NAT_MODE_DISABLED); + } + else if (entry == "NAT Traversal Mode") + { + if (value == "natt") + _vpncWidget->cboNAT->setCurrentItem(NAT_MODE_NATT); + else if (value == "cisco-udp") + _vpncWidget->cboNAT->setCurrentItem(NAT_MODE_CISCO); + else if (value == "none") + _vpncWidget->cboNAT->setCurrentItem(NAT_MODE_DISABLED); + else + { + // FIXME: unknown NAT mode + } + } + else if (entry == "Enable Single DES") + { + _vpncWidget->chkSingleDES->setChecked(value == "yes" || value == "true"); + } + } + + // set routes + if (!routes.empty()) + { + _vpncWidget->chkIPAdresses->setChecked(true); + _vpncWidget->routes->setText(routes.join(" ")); + } +} + +TQMap VPNCConfig::getVPNProperties() +{ + // build a StingList of properties + TQMap strlist; + strlist.insert("IPSec gateway", TQString(_vpncWidget->IPSec_gateway->text())); + strlist.insert("IPSec ID", TQString(_vpncWidget->IPSec_ID->text())); + + //if (_vpncWidget->chkOverrideUsername->isChecked()) + strlist.insert("Xauth username", TQString(_vpncWidget->Xauth_username->text())); + + if (_vpncWidget->chkUseDomain->isChecked()) + strlist.insert("Domain", TQString(_vpncWidget->Domain->text())); + + if (_vpncWidget->chkUseKeepAlive->isChecked()) + strlist.insert("NAT-Keepalive packet interval", TQString(_vpncWidget->nat_keep_alive_interval->text())); + + switch (_vpncWidget->cboNAT->currentItem()) + { + case NAT_MODE_CISCO: + strlist.insert("NAT Traversal Mode", "cisco-udp"); + break; + case NAT_MODE_NATT: + strlist.insert("NAT Traversal Mode", "natt"); + break; + case NAT_MODE_DISABLED: + default: + strlist.insert("NAT Traversal Mode", "none"); + break; + } + + if (_vpncWidget->chkSingleDES->isChecked()) + strlist.insert("Enable Single DES", "yes"); + else + strlist.insert("Enable Single DES", "no"); + + return strlist; +} + +TQStringList VPNCConfig::getVPNRoutes() +{ + TQStringList strlist; + if(_vpncWidget->chkIPAdresses->isChecked()) + { + strlist = TQStringList::split(" ", _vpncWidget->routes->text()); + } + return strlist; + +} + +bool VPNCConfig::hasChanged() +{ + return true; +} + +bool VPNCConfig::isValid(TQStringList& err_msg) +{ + bool retval = true; + if(_vpncWidget->IPSec_gateway->text() == "" || _vpncWidget->IPSec_ID->text() == "") + { + err_msg.append(i18n("At least the gateway and group has to be supplied.")); + retval = false; + } + return retval; +} + +VPNCAuthentication::VPNCAuthentication(TQWidget* parent, char* name) + : VPNAuthenticationWidget(parent, name) +{ + TQVBoxLayout* tqlayout = new TQVBoxLayout(this, 1, 1); + _vpncAuth = new VPNCAuthenticationWidget(this); + tqlayout->addWidget(_vpncAuth); +} + +VPNCAuthentication::~VPNCAuthentication() +{ + +} + +TQMap VPNCAuthentication::getPasswords() +{ + TQMap pwds; + pwds.insert("Xauth password", TQString(_vpncAuth->editUserPassword->password())); + if (_vpncAuth->chkObfusticated->isChecked()) { + // Decrypt the obfusticated password with /usr/lib/vpnc/cisco-decrypt + string decryptcommand="/usr/lib/vpnc/cisco-decrypt "; + FILE *pipe_decrypt; + char decrypted_result[2048]; + int i; + + decryptcommand.append(_vpncAuth->editGroupPassword->password()); + printf("Group password decrypt command: %s\n\r", decryptcommand.c_str()); + if ((pipe_decrypt = popen(decryptcommand.c_str(), "r")) == NULL) + { + printf("Group password decrypt error\n\r"); + } + else { + fgets(decrypted_result, 2048, pipe_decrypt); + pclose(pipe_decrypt); + for (i=0;i<2048;i++) { + if (decrypted_result[i] == 0) { + decrypted_result[i-1]=0; + i=2048; + } + } + printf("Group password decrypt result: '%s'\n\r", decrypted_result); + pwds.insert("IPSec secret", TQString(decrypted_result)); + } + } + else { + pwds.insert("IPSec secret", TQString(_vpncAuth->editGroupPassword->password())); + } + return pwds; +} + +void VPNCAuthentication::setPasswords(TQString name, TQString value) { + if (name == TQString("Xauth password")) { + _vpncAuth->editUserPassword->erase(); + _vpncAuth->editUserPassword->insert(value); + } + else if (name == TQString("IPSec secret")) { + _vpncAuth->editGroupPassword->erase(); + _vpncAuth->editGroupPassword->insert(value); + } +} \ No newline at end of file diff --git a/knetworkmanager-0.8/vpn-plugins/vpnc/src/knetworkmanager-vpnc.h b/knetworkmanager-0.8/vpn-plugins/vpnc/src/knetworkmanager-vpnc.h new file mode 100644 index 0000000..429bc55 --- /dev/null +++ b/knetworkmanager-0.8/vpn-plugins/vpnc/src/knetworkmanager-vpnc.h @@ -0,0 +1,89 @@ +/*************************************************************************** + * + * knetworkmanager-vpnc.h - A NetworkManager frontend for KDE + * + * Copyright (C) 2006 Novell, Inc. + * + * Author: Helmut Schaa , + * Author: Timothy Pearson + * + * This program is free software; you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation; either version 2 of the License, or + * (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program; if not, write to the Free Software + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA + * + **************************************************************************/ + +#ifndef KNETWORKMANAGER_VPNC_H +#define KNETWORKMANAGER_VPNC_H + +#include +#include +#include +#include + +#include "knetworkmanager-vpnplugin.h" +#include "vpncprop.h" +#include "vpncauth.h" + +class VPNCPlugin : public VPNPlugin +{ + Q_OBJECT + TQ_OBJECT + public: + VPNCPlugin(TQObject*, const char*, const TQStringList&); + ~VPNCPlugin(); + + VPNConfigWidget* CreateConfigWidget(TQWidget* parent=0); + VPNAuthenticationWidget* CreateAuthenticationWidget(TQWidget* parent=0); +}; + +class VPNCConfig : public VPNConfigWidget +{ + Q_OBJECT + TQ_OBJECT + public: + void setVPNData(const TQStringList& routes, const TQMap& properties); + TQMap getVPNProperties(); + TQStringList getVPNRoutes(); + bool hasChanged(); + bool isValid(TQStringList& ); + + VPNCConfig(TQWidget* parent); + ~VPNCConfig(); + + public slots: + void pcfImport(); + + private: + VPNCConfigWidget* _vpncWidget; + int getFileConfig(char *parameter, char *line); + + protected slots: + void languageChange(); +}; + +class VPNCAuthentication : public VPNAuthenticationWidget +{ + Q_OBJECT + TQ_OBJECT + public: + VPNCAuthentication(TQWidget* parent = NULL, char* name = NULL); + ~VPNCAuthentication(); + TQMap getPasswords(); + void setPasswords(TQString name, TQString value); + + private: + VPNCAuthenticationWidget* _vpncAuth; +}; + +#endif /* KNETWORKMANAGER_VPNC_H */ diff --git a/knetworkmanager-0.8/vpn-plugins/vpnc/src/vpncauth.ui b/knetworkmanager-0.8/vpn-plugins/vpnc/src/vpncauth.ui new file mode 100644 index 0000000..4fdf2f1 --- /dev/null +++ b/knetworkmanager-0.8/vpn-plugins/vpnc/src/vpncauth.ui @@ -0,0 +1,68 @@ + +VPNCAuthenticationWidget + + + VPNCAuthenticationWidget + + + + 0 + 0 + 372 + 75 + + + + VPNCAuthentication + + + + unnamed + + + 0 + + + + textLabel1 + + + Password + + + + + textLabel2 + + + Group Password + + + + + editUserPassword + + + + + editGroupPassword + + + + + chkObfusticated + + + Group password is hashed + + + + + + + + + + + + diff --git a/knetworkmanager-0.8/vpn-plugins/vpnc/src/vpncprop.ui b/knetworkmanager-0.8/vpn-plugins/vpnc/src/vpncprop.ui new file mode 100644 index 0000000..ab2b8fc --- /dev/null +++ b/knetworkmanager-0.8/vpn-plugins/vpnc/src/vpncprop.ui @@ -0,0 +1,279 @@ + +VPNCConfigWidget + + + VPNCConfigWidget + + + + 0 + 0 + 667 + 435 + + + + VPNCConfigWidget + + + + unnamed + + + 0 + + + + kTabWidget1 + + + + TabPage + + + Required Information + + + + unnamed + + + + textLabel3 + + + Gateway + + + IPSec_gateway + + + + + IPSec_gateway + + + + + labelGroup + + + Group Name + + + IPSec_ID + + + + + IPSec_ID + + + + + lblUsername + + + true + + + User Name + + + + + Xauth_username + + + true + + + + + groupBox5_3 + + + Import settings from Cisco PCF file + + + + unnamed + + + + editPCF + + + + + textLabel2_2 + + + PCF File + + + + + pcfImport + + + Import + + + + + + + spacer9 + + + Vertical + + + Expanding + + + + 20 + 40 + + + + + + + + TabPage + + + Optional Information + + + + unnamed + + + + chkUseKeepAlive + + + Use NAT keep alive packets + + + + + chkUseDomain + + + Use domain for authentication + + + + + lblDomain + + + false + + + Domain + + + + + lblKeepAliveInterval + + + false + + + Interval + + + + + nat_keep_alive_interval + + + false + + + + 7 + 0 + 0 + 0 + + + + + + Domain + + + false + + + + + textLabel1 + + + NAT traversal + + + + + cboNAT + + + + + chkSingleDES + + + Enable weak single DES encryption + + + + + chkIPAdresses + + + Only use VPN Connection for these Adresses (for example: 172.16.0.0/16 10.11.12.0/24) + + + + + spacer10 + + + Vertical + + + Expanding + + + + 20 + 20 + + + + + + routes + + + false + + + + + + + + + + + -- cgit v1.2.1