Initial commit
This commit is contained in:
214
common/rfb/Security.cxx
Normal file
214
common/rfb/Security.cxx
Normal file
@@ -0,0 +1,214 @@
|
||||
/* Copyright (C) 2002-2005 RealVNC Ltd. All Rights Reserved.
|
||||
* Copyright (C) 2010 TigerVNC Team
|
||||
*
|
||||
* This is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* This software is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this software; if not, write to the Free Software
|
||||
* Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307,
|
||||
* USA.
|
||||
*/
|
||||
|
||||
#ifdef HAVE_CONFIG_H
|
||||
#include <config.h>
|
||||
#endif
|
||||
|
||||
#include <assert.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include <rfb/CSecurityNone.h>
|
||||
#include <rfb/CSecurityStack.h>
|
||||
#include <rfb/CSecurityVeNCrypt.h>
|
||||
#include <rfb/CSecurityVncAuth.h>
|
||||
#include <rfb/CSecurityPlain.h>
|
||||
#include <rdr/Exception.h>
|
||||
#include <rfb/LogWriter.h>
|
||||
#include <rfb/Security.h>
|
||||
#include <rfb/SSecurityNone.h>
|
||||
#include <rfb/SSecurityStack.h>
|
||||
#include <rfb/SSecurityPlain.h>
|
||||
#include <rfb/SSecurityVncAuth.h>
|
||||
#include <rfb/SSecurityVeNCrypt.h>
|
||||
#ifdef HAVE_GNUTLS
|
||||
#include <rfb/CSecurityTLS.h>
|
||||
#include <rfb/SSecurityTLS.h>
|
||||
#endif
|
||||
#include <rfb/util.h>
|
||||
|
||||
using namespace rdr;
|
||||
using namespace rfb;
|
||||
using namespace std;
|
||||
|
||||
static LogWriter vlog("Security");
|
||||
|
||||
#ifdef HAVE_GNUTLS
|
||||
StringParameter Security::GnuTLSPriority("GnuTLSPriority",
|
||||
"GnuTLS priority string that controls the TLS session’s handshake algorithms",
|
||||
"NORMAL");
|
||||
#endif
|
||||
|
||||
Security::Security()
|
||||
{
|
||||
}
|
||||
|
||||
Security::Security(StringParameter &secTypes)
|
||||
{
|
||||
char *secTypesStr;
|
||||
|
||||
secTypesStr = secTypes.getData();
|
||||
enabledSecTypes = parseSecTypes(secTypesStr);
|
||||
|
||||
delete [] secTypesStr;
|
||||
}
|
||||
|
||||
const std::list<rdr::U8> Security::GetEnabledSecTypes(void)
|
||||
{
|
||||
list<rdr::U8> result;
|
||||
list<U32>::iterator i;
|
||||
|
||||
/* Partial workaround for Vino's stupid behaviour. It doesn't allow
|
||||
* the basic authentication types as part of the VeNCrypt handshake,
|
||||
* making it impossible for a client to do opportunistic encryption.
|
||||
* At least make it possible to connect when encryption is explicitly
|
||||
* disabled. */
|
||||
for (i = enabledSecTypes.begin(); i != enabledSecTypes.end(); i++) {
|
||||
if (*i >= 0x100) {
|
||||
result.push_back(secTypeVeNCrypt);
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
for (i = enabledSecTypes.begin(); i != enabledSecTypes.end(); i++)
|
||||
if (*i < 0x100)
|
||||
result.push_back(*i);
|
||||
|
||||
return result;
|
||||
}
|
||||
|
||||
const std::list<rdr::U32> Security::GetEnabledExtSecTypes(void)
|
||||
{
|
||||
list<rdr::U32> result;
|
||||
list<U32>::iterator i;
|
||||
|
||||
for (i = enabledSecTypes.begin(); i != enabledSecTypes.end(); i++)
|
||||
if (*i != secTypeVeNCrypt) /* Do not include VeNCrypt type to avoid loops */
|
||||
result.push_back(*i);
|
||||
|
||||
return result;
|
||||
}
|
||||
|
||||
void Security::EnableSecType(U32 secType)
|
||||
{
|
||||
list<U32>::iterator i;
|
||||
|
||||
for (i = enabledSecTypes.begin(); i != enabledSecTypes.end(); i++)
|
||||
if (*i == secType)
|
||||
return;
|
||||
|
||||
enabledSecTypes.push_back(secType);
|
||||
}
|
||||
|
||||
bool Security::IsSupported(U32 secType)
|
||||
{
|
||||
list<U32>::iterator i;
|
||||
|
||||
for (i = enabledSecTypes.begin(); i != enabledSecTypes.end(); i++)
|
||||
if (*i == secType)
|
||||
return true;
|
||||
if (secType == secTypeVeNCrypt)
|
||||
return true;
|
||||
|
||||
return false;
|
||||
}
|
||||
|
||||
char *Security::ToString(void)
|
||||
{
|
||||
list<U32>::iterator i;
|
||||
static char out[128]; /* Should be enough */
|
||||
bool firstpass = true;
|
||||
const char *name;
|
||||
|
||||
memset(out, 0, sizeof(out));
|
||||
|
||||
for (i = enabledSecTypes.begin(); i != enabledSecTypes.end(); i++) {
|
||||
name = secTypeName(*i);
|
||||
if (name[0] == '[') /* Unknown security type */
|
||||
continue;
|
||||
|
||||
if (!firstpass)
|
||||
strncat(out, ",", sizeof(out) - 1);
|
||||
else
|
||||
firstpass = false;
|
||||
strncat(out, name, sizeof(out) - 1);
|
||||
}
|
||||
|
||||
return out;
|
||||
}
|
||||
|
||||
rdr::U32 rfb::secTypeNum(const char* name)
|
||||
{
|
||||
if (strcasecmp(name, "None") == 0) return secTypeNone;
|
||||
if (strcasecmp(name, "VncAuth") == 0) return secTypeVncAuth;
|
||||
if (strcasecmp(name, "Tight") == 0) return secTypeTight;
|
||||
if (strcasecmp(name, "RA2") == 0) return secTypeRA2;
|
||||
if (strcasecmp(name, "RA2ne") == 0) return secTypeRA2ne;
|
||||
if (strcasecmp(name, "SSPI") == 0) return secTypeSSPI;
|
||||
if (strcasecmp(name, "SSPIne") == 0) return secTypeSSPIne;
|
||||
if (strcasecmp(name, "VeNCrypt") == 0) return secTypeVeNCrypt;
|
||||
|
||||
/* VeNCrypt subtypes */
|
||||
if (strcasecmp(name, "Plain") == 0) return secTypePlain;
|
||||
if (strcasecmp(name, "TLSNone") == 0) return secTypeTLSNone;
|
||||
if (strcasecmp(name, "TLSVnc") == 0) return secTypeTLSVnc;
|
||||
if (strcasecmp(name, "TLSPlain") == 0) return secTypeTLSPlain;
|
||||
if (strcasecmp(name, "X509None") == 0) return secTypeX509None;
|
||||
if (strcasecmp(name, "X509Vnc") == 0) return secTypeX509Vnc;
|
||||
if (strcasecmp(name, "X509Plain") == 0) return secTypeX509Plain;
|
||||
|
||||
return secTypeInvalid;
|
||||
}
|
||||
|
||||
const char* rfb::secTypeName(rdr::U32 num)
|
||||
{
|
||||
switch (num) {
|
||||
case secTypeNone: return "None";
|
||||
case secTypeVncAuth: return "VncAuth";
|
||||
case secTypeTight: return "Tight";
|
||||
case secTypeRA2: return "RA2";
|
||||
case secTypeRA2ne: return "RA2ne";
|
||||
case secTypeSSPI: return "SSPI";
|
||||
case secTypeSSPIne: return "SSPIne";
|
||||
case secTypeVeNCrypt: return "VeNCrypt";
|
||||
|
||||
/* VeNCrypt subtypes */
|
||||
case secTypePlain: return "Plain";
|
||||
case secTypeTLSNone: return "TLSNone";
|
||||
case secTypeTLSVnc: return "TLSVnc";
|
||||
case secTypeTLSPlain: return "TLSPlain";
|
||||
case secTypeX509None: return "X509None";
|
||||
case secTypeX509Vnc: return "X509Vnc";
|
||||
case secTypeX509Plain: return "X509Plain";
|
||||
default: return "[unknown secType]";
|
||||
}
|
||||
}
|
||||
|
||||
std::list<rdr::U32> rfb::parseSecTypes(const char* types_)
|
||||
{
|
||||
std::list<rdr::U32> result;
|
||||
CharArray types(strDup(types_)), type;
|
||||
while (types.buf) {
|
||||
strSplit(types.buf, ',', &type.buf, &types.buf);
|
||||
rdr::U32 typeNum = secTypeNum(type.buf);
|
||||
if (typeNum != secTypeInvalid)
|
||||
result.push_back(typeNum);
|
||||
}
|
||||
return result;
|
||||
}
|
||||
Reference in New Issue
Block a user