dfb3f21069
git-svn-id: svn://svn.code.sf.net/p/rdesktop/code/rdesktop/trunk@1708 423420c4-83ab-492f-b58f-81f9feb106b5
1813 lines
40 KiB
C
1813 lines
40 KiB
C
/* -*- c-basic-offset: 8 -*-
|
|
rdesktop: A Remote Desktop Protocol client.
|
|
Entrypoint and utility functions
|
|
Copyright (C) Matthew Chapman <matthewc.unsw.edu.au> 1999-2008
|
|
Copyright 2002-2011 Peter Astrand <astrand@cendio.se> for Cendio AB
|
|
Copyright 2010-2013 Henrik Andersson <hean01@cendio.se> for Cendio AB
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include <stdarg.h> /* va_list va_start va_end */
|
|
#include <unistd.h> /* read close getuid getgid getpid getppid gethostname */
|
|
#include <fcntl.h> /* open */
|
|
#include <pwd.h> /* getpwuid */
|
|
#include <termios.h> /* tcgetattr tcsetattr */
|
|
#include <sys/stat.h> /* stat */
|
|
#include <sys/time.h> /* gettimeofday */
|
|
#include <sys/times.h> /* times */
|
|
#include <ctype.h> /* toupper */
|
|
#include <limits.h>
|
|
#include <errno.h>
|
|
#include <signal.h>
|
|
#include "rdesktop.h"
|
|
|
|
#ifdef HAVE_LOCALE_H
|
|
#include <locale.h>
|
|
#endif
|
|
#ifdef HAVE_ICONV
|
|
#ifdef HAVE_LANGINFO_H
|
|
#include <langinfo.h>
|
|
#endif
|
|
#endif
|
|
|
|
#ifdef EGD_SOCKET
|
|
#include <sys/types.h>
|
|
#include <sys/socket.h> /* socket connect */
|
|
#include <sys/un.h> /* sockaddr_un */
|
|
#endif
|
|
|
|
#include "ssl.h"
|
|
|
|
#define RDESKTOP_LICENSE_STORE "/.local/share/rdesktop/licenses"
|
|
|
|
uint8 g_static_rdesktop_salt_16[16] = {
|
|
0xb8, 0x82, 0x29, 0x31, 0xc5, 0x39, 0xd9, 0x44,
|
|
0x54, 0x15, 0x5e, 0x14, 0x71, 0x38, 0xd5, 0x4d
|
|
};
|
|
|
|
char g_title[64] = "";
|
|
char *g_username;
|
|
char g_hostname[16];
|
|
char g_keymapname[PATH_MAX] = "";
|
|
unsigned int g_keylayout = 0x409; /* Defaults to US keyboard layout */
|
|
int g_keyboard_type = 0x4; /* Defaults to US keyboard layout */
|
|
int g_keyboard_subtype = 0x0; /* Defaults to US keyboard layout */
|
|
int g_keyboard_functionkeys = 0xc; /* Defaults to US keyboard layout */
|
|
int g_sizeopt = 0; /* If non-zero, a special size has been
|
|
requested. If 1, the geometry will be fetched
|
|
from _NET_WORKAREA. If negative, absolute value
|
|
specifies the percent of the whole screen. */
|
|
int g_width = 800;
|
|
int g_height = 600;
|
|
int g_xpos = 0;
|
|
int g_ypos = 0;
|
|
int g_pos = 0; /* 0 position unspecified,
|
|
1 specified,
|
|
2 xpos neg,
|
|
4 ypos neg */
|
|
extern int g_tcp_port_rdp;
|
|
int g_server_depth = -1;
|
|
int g_win_button_size = 0; /* If zero, disable single app mode */
|
|
RD_BOOL g_network_error = False;
|
|
RD_BOOL g_bitmap_compression = True;
|
|
RD_BOOL g_sendmotion = True;
|
|
RD_BOOL g_bitmap_cache = True;
|
|
RD_BOOL g_bitmap_cache_persist_enable = False;
|
|
RD_BOOL g_bitmap_cache_precache = True;
|
|
RD_BOOL g_use_ctrl = True;
|
|
RD_BOOL g_encryption = True;
|
|
RD_BOOL g_packet_encryption = True;
|
|
RD_BOOL g_desktop_save = True; /* desktop save order */
|
|
RD_BOOL g_polygon_ellipse_orders = True; /* polygon / ellipse orders */
|
|
RD_BOOL g_fullscreen = False;
|
|
RD_BOOL g_grab_keyboard = True;
|
|
RD_BOOL g_hide_decorations = False;
|
|
RDP_VERSION g_rdp_version = RDP_V5; /* Default to version 5 */
|
|
RD_BOOL g_rdpclip = True;
|
|
RD_BOOL g_console_session = False;
|
|
RD_BOOL g_numlock_sync = False;
|
|
RD_BOOL g_lspci_enabled = False;
|
|
RD_BOOL g_owncolmap = False;
|
|
RD_BOOL g_ownbackstore = True; /* We can't rely on external BackingStore */
|
|
RD_BOOL g_seamless_rdp = False;
|
|
RD_BOOL g_use_password_as_pin = False;
|
|
char g_seamless_shell[512];
|
|
char g_seamless_spawn_cmd[512];
|
|
RD_BOOL g_user_quit = False;
|
|
uint32 g_embed_wnd;
|
|
uint32 g_rdp5_performanceflags =
|
|
RDP5_NO_WALLPAPER | RDP5_NO_FULLWINDOWDRAG | RDP5_NO_MENUANIMATIONS;
|
|
/* Session Directory redirection */
|
|
RD_BOOL g_redirect = False;
|
|
char g_redirect_server[64];
|
|
char g_redirect_domain[16];
|
|
char g_redirect_password[64];
|
|
char *g_redirect_username;
|
|
char g_redirect_cookie[128];
|
|
uint32 g_redirect_flags = 0;
|
|
|
|
uint32 g_reconnect_logonid = 0;
|
|
char g_reconnect_random[16];
|
|
time_t g_reconnect_random_ts;
|
|
RD_BOOL g_has_reconnect_random = False;
|
|
uint8 g_client_random[SEC_RANDOM_SIZE];
|
|
RD_BOOL g_pending_resize = False;
|
|
|
|
#ifdef WITH_RDPSND
|
|
RD_BOOL g_rdpsnd = False;
|
|
#endif
|
|
|
|
#ifdef HAVE_ICONV
|
|
char g_codepage[16] = "";
|
|
#endif
|
|
|
|
char *g_sc_csp_name = NULL; /* Smartcard CSP name */
|
|
char *g_sc_reader_name = NULL;
|
|
char *g_sc_card_name = NULL;
|
|
char *g_sc_container_name = NULL;
|
|
|
|
extern RDPDR_DEVICE g_rdpdr_device[];
|
|
extern uint32 g_num_devices;
|
|
extern char *g_rdpdr_clientname;
|
|
|
|
#ifdef RDP2VNC
|
|
extern int rfb_port;
|
|
extern int defer_time;
|
|
void
|
|
rdp2vnc_connect(char *server, uint32 flags, char *domain, char *password,
|
|
char *shell, char *directory);
|
|
#endif
|
|
/* Display usage information */
|
|
static void
|
|
usage(char *program)
|
|
{
|
|
fprintf(stderr, "rdesktop: A Remote Desktop Protocol client.\n");
|
|
fprintf(stderr,
|
|
"Version " PACKAGE_VERSION ". Copyright (C) 1999-2011 Matthew Chapman et al.\n");
|
|
fprintf(stderr, "See http://www.rdesktop.org/ for more information.\n\n");
|
|
|
|
fprintf(stderr, "Usage: %s [options] server[:port]\n", program);
|
|
#ifdef RDP2VNC
|
|
fprintf(stderr, " -V: vnc port\n");
|
|
fprintf(stderr, " -Q: defer time (ms)\n");
|
|
#endif
|
|
fprintf(stderr, " -u: user name\n");
|
|
fprintf(stderr, " -d: domain\n");
|
|
fprintf(stderr, " -s: shell / seamless application to start remotly\n");
|
|
fprintf(stderr, " -c: working directory\n");
|
|
fprintf(stderr, " -p: password (- to prompt)\n");
|
|
fprintf(stderr, " -n: client hostname\n");
|
|
fprintf(stderr, " -k: keyboard layout on server (en-us, de, sv, etc.)\n");
|
|
fprintf(stderr, " -g: desktop geometry (WxH)\n");
|
|
#ifdef WITH_SCARD
|
|
fprintf(stderr, " -i: enables smartcard authentication, password is used as pin\n");
|
|
#endif
|
|
fprintf(stderr, " -f: full-screen mode\n");
|
|
fprintf(stderr, " -b: force bitmap updates\n");
|
|
#ifdef HAVE_ICONV
|
|
fprintf(stderr, " -L: local codepage\n");
|
|
#endif
|
|
fprintf(stderr, " -A: path to SeamlessRDP shell, this enables SeamlessRDP mode\n");
|
|
fprintf(stderr, " -B: use BackingStore of X-server (if available)\n");
|
|
fprintf(stderr, " -e: disable encryption (French TS)\n");
|
|
fprintf(stderr, " -E: disable encryption from client to server\n");
|
|
fprintf(stderr, " -m: do not send motion events\n");
|
|
fprintf(stderr, " -C: use private colour map\n");
|
|
fprintf(stderr, " -D: hide window manager decorations\n");
|
|
fprintf(stderr, " -K: keep window manager key bindings\n");
|
|
fprintf(stderr, " -S: caption button size (single application mode)\n");
|
|
fprintf(stderr, " -T: window title\n");
|
|
fprintf(stderr, " -t: disable use of remote ctrl\n");
|
|
fprintf(stderr, " -N: enable numlock syncronization\n");
|
|
fprintf(stderr, " -X: embed into another window with a given id.\n");
|
|
fprintf(stderr, " -a: connection colour depth\n");
|
|
fprintf(stderr, " -z: enable rdp compression\n");
|
|
fprintf(stderr, " -x: RDP5 experience (m[odem 28.8], b[roadband], l[an] or hex nr.)\n");
|
|
fprintf(stderr, " -P: use persistent bitmap caching\n");
|
|
fprintf(stderr, " -r: enable specified device redirection (this flag can be repeated)\n");
|
|
fprintf(stderr,
|
|
" '-r comport:COM1=/dev/ttyS0': enable serial redirection of /dev/ttyS0 to COM1\n");
|
|
fprintf(stderr, " or COM1=/dev/ttyS0,COM2=/dev/ttyS1\n");
|
|
fprintf(stderr,
|
|
" '-r disk:floppy=/mnt/floppy': enable redirection of /mnt/floppy to 'floppy' share\n");
|
|
fprintf(stderr, " or 'floppy=/mnt/floppy,cdrom=/mnt/cdrom'\n");
|
|
fprintf(stderr, " '-r clientname=<client name>': Set the client name displayed\n");
|
|
fprintf(stderr, " for redirected disks\n");
|
|
fprintf(stderr,
|
|
" '-r lptport:LPT1=/dev/lp0': enable parallel redirection of /dev/lp0 to LPT1\n");
|
|
fprintf(stderr, " or LPT1=/dev/lp0,LPT2=/dev/lp1\n");
|
|
fprintf(stderr, " '-r printer:mydeskjet': enable printer redirection\n");
|
|
fprintf(stderr,
|
|
" or mydeskjet=\"HP LaserJet IIIP\" to enter server driver as well\n");
|
|
#ifdef WITH_RDPSND
|
|
fprintf(stderr,
|
|
" '-r sound:[local[:driver[:device]]|off|remote]': enable sound redirection\n");
|
|
fprintf(stderr, " remote would leave sound on server\n");
|
|
fprintf(stderr, " available drivers for 'local':\n");
|
|
rdpsnd_show_help();
|
|
#endif
|
|
fprintf(stderr,
|
|
" '-r clipboard:[off|PRIMARYCLIPBOARD|CLIPBOARD]': enable clipboard\n");
|
|
fprintf(stderr, " redirection.\n");
|
|
fprintf(stderr,
|
|
" 'PRIMARYCLIPBOARD' looks at both PRIMARY and CLIPBOARD\n");
|
|
fprintf(stderr, " when sending data to server.\n");
|
|
fprintf(stderr, " 'CLIPBOARD' looks at only CLIPBOARD.\n");
|
|
#ifdef WITH_SCARD
|
|
fprintf(stderr, " '-r scard[:\"Scard Name\"=\"Alias Name[;Vendor Name]\"[,...]]\n");
|
|
fprintf(stderr, " example: -r scard:\"eToken PRO 00 00\"=\"AKS ifdh 0\"\n");
|
|
fprintf(stderr,
|
|
" \"eToken PRO 00 00\" -> Device in Linux/Unix enviroment\n");
|
|
fprintf(stderr,
|
|
" \"AKS ifdh 0\" -> Device shown in Windows enviroment \n");
|
|
fprintf(stderr, " example: -r scard:\"eToken PRO 00 00\"=\"AKS ifdh 0;AKS\"\n");
|
|
fprintf(stderr,
|
|
" \"eToken PRO 00 00\" -> Device in Linux/Unix enviroment\n");
|
|
fprintf(stderr,
|
|
" \"AKS ifdh 0\" -> Device shown in Windows enviroment \n");
|
|
fprintf(stderr,
|
|
" \"AKS\" -> Device vendor name \n");
|
|
#endif
|
|
fprintf(stderr, " -0: attach to console\n");
|
|
fprintf(stderr, " -4: use RDP version 4\n");
|
|
fprintf(stderr, " -5: use RDP version 5 (default)\n");
|
|
#ifdef WITH_SCARD
|
|
fprintf(stderr, " -o: name=value: Adds an additional option to rdesktop.\n");
|
|
fprintf(stderr,
|
|
" sc-csp-name Specifies the Crypto Service Provider name which\n");
|
|
fprintf(stderr,
|
|
" is used to authenticate the user by smartcard\n");
|
|
fprintf(stderr,
|
|
" sc-container-name Specifies the container name, this is usally the username\n");
|
|
fprintf(stderr, " sc-reader-name Smartcard reader name to use\n");
|
|
fprintf(stderr,
|
|
" sc-card-name Specifies the card name of the smartcard to use\n");
|
|
#endif
|
|
|
|
fprintf(stderr, "\n");
|
|
|
|
}
|
|
|
|
static int
|
|
handle_disconnect_reason(RD_BOOL deactivated, uint16 reason)
|
|
{
|
|
char *text;
|
|
int retval;
|
|
|
|
switch (reason)
|
|
{
|
|
case exDiscReasonNoInfo:
|
|
text = "No information available";
|
|
if (deactivated)
|
|
retval = EX_OK;
|
|
else
|
|
retval = EXRD_UNKNOWN;
|
|
break;
|
|
|
|
case exDiscReasonAPIInitiatedDisconnect:
|
|
case exDiscReasonWindows7Disconnect:
|
|
text = "Server initiated disconnect";
|
|
retval = EXRD_API_DISCONNECT;
|
|
break;
|
|
|
|
case exDiscReasonAPIInitiatedLogoff:
|
|
text = "Server initiated logoff";
|
|
retval = EXRD_API_LOGOFF;
|
|
break;
|
|
|
|
case exDiscReasonServerIdleTimeout:
|
|
text = "Server idle timeout reached";
|
|
retval = EXRD_IDLE_TIMEOUT;
|
|
break;
|
|
|
|
case exDiscReasonServerLogonTimeout:
|
|
text = "Server logon timeout reached";
|
|
retval = EXRD_LOGON_TIMEOUT;
|
|
break;
|
|
|
|
case exDiscReasonReplacedByOtherConnection:
|
|
text = "The session was replaced";
|
|
retval = EXRD_REPLACED;
|
|
break;
|
|
|
|
case exDiscReasonOutOfMemory:
|
|
text = "The server is out of memory";
|
|
retval = EXRD_OUT_OF_MEM;
|
|
break;
|
|
|
|
case exDiscReasonServerDeniedConnection:
|
|
text = "The server denied the connection";
|
|
retval = EXRD_DENIED;
|
|
break;
|
|
|
|
case exDiscReasonServerDeniedConnectionFips:
|
|
text = "The server denied the connection for security reason";
|
|
retval = EXRD_DENIED_FIPS;
|
|
break;
|
|
|
|
case exDiscReasonLicenseInternal:
|
|
text = "Internal licensing error";
|
|
retval = EXRD_LIC_INTERNAL;
|
|
break;
|
|
|
|
case exDiscReasonLicenseNoLicenseServer:
|
|
text = "No license server available";
|
|
retval = EXRD_LIC_NOSERVER;
|
|
break;
|
|
|
|
case exDiscReasonLicenseNoLicense:
|
|
text = "No valid license available";
|
|
retval = EXRD_LIC_NOLICENSE;
|
|
break;
|
|
|
|
case exDiscReasonLicenseErrClientMsg:
|
|
text = "Invalid licensing message";
|
|
retval = EXRD_LIC_MSG;
|
|
break;
|
|
|
|
case exDiscReasonLicenseHwidDoesntMatchLicense:
|
|
text = "Hardware id doesn't match software license";
|
|
retval = EXRD_LIC_HWID;
|
|
break;
|
|
|
|
case exDiscReasonLicenseErrClientLicense:
|
|
text = "Client license error";
|
|
retval = EXRD_LIC_CLIENT;
|
|
break;
|
|
|
|
case exDiscReasonLicenseCantFinishProtocol:
|
|
text = "Network error during licensing protocol";
|
|
retval = EXRD_LIC_NET;
|
|
break;
|
|
|
|
case exDiscReasonLicenseClientEndedProtocol:
|
|
text = "Licensing protocol was not completed";
|
|
retval = EXRD_LIC_PROTO;
|
|
break;
|
|
|
|
case exDiscReasonLicenseErrClientEncryption:
|
|
text = "Incorrect client license encryption";
|
|
retval = EXRD_LIC_ENC;
|
|
break;
|
|
|
|
case exDiscReasonLicenseCantUpgradeLicense:
|
|
text = "Can't upgrade license";
|
|
retval = EXRD_LIC_UPGRADE;
|
|
break;
|
|
|
|
case exDiscReasonLicenseNoRemoteConnections:
|
|
text = "The server is not licensed to accept remote connections";
|
|
retval = EXRD_LIC_NOREMOTE;
|
|
break;
|
|
|
|
default:
|
|
if (reason > 0x1000 && reason < 0x7fff)
|
|
{
|
|
text = "Internal protocol error";
|
|
}
|
|
else
|
|
{
|
|
text = "Unknown reason";
|
|
}
|
|
retval = EXRD_UNKNOWN;
|
|
}
|
|
if (reason != exDiscReasonNoInfo)
|
|
fprintf(stderr, "disconnect: %s.\n", text);
|
|
|
|
return retval;
|
|
}
|
|
|
|
static void
|
|
rdesktop_reset_state(void)
|
|
{
|
|
rdp_reset_state();
|
|
#ifdef WITH_SCARD
|
|
scard_reset_state();
|
|
#endif
|
|
#ifdef WITH_RDPSND
|
|
rdpsnd_reset_state();
|
|
#endif
|
|
}
|
|
|
|
static RD_BOOL
|
|
read_password(char *password, int size)
|
|
{
|
|
struct termios tios;
|
|
RD_BOOL ret = False;
|
|
int istty = 0;
|
|
char *p;
|
|
|
|
if (tcgetattr(STDIN_FILENO, &tios) == 0)
|
|
{
|
|
fprintf(stderr, "Password: ");
|
|
tios.c_lflag &= ~ECHO;
|
|
tcsetattr(STDIN_FILENO, TCSANOW, &tios);
|
|
istty = 1;
|
|
}
|
|
|
|
if (fgets(password, size, stdin) != NULL)
|
|
{
|
|
ret = True;
|
|
|
|
/* strip final newline */
|
|
p = strchr(password, '\n');
|
|
if (p != NULL)
|
|
*p = 0;
|
|
}
|
|
|
|
if (istty)
|
|
{
|
|
tios.c_lflag |= ECHO;
|
|
tcsetattr(STDIN_FILENO, TCSANOW, &tios);
|
|
fprintf(stderr, "\n");
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
static void
|
|
parse_server_and_port(char *server)
|
|
{
|
|
char *p;
|
|
#ifdef IPv6
|
|
int addr_colons;
|
|
#endif
|
|
|
|
#ifdef IPv6
|
|
p = server;
|
|
addr_colons = 0;
|
|
while (*p)
|
|
if (*p++ == ':')
|
|
addr_colons++;
|
|
if (addr_colons >= 2)
|
|
{
|
|
/* numeric IPv6 style address format - [1:2:3::4]:port */
|
|
p = strchr(server, ']');
|
|
if (*server == '[' && p != NULL)
|
|
{
|
|
if (*(p + 1) == ':' && *(p + 2) != '\0')
|
|
g_tcp_port_rdp = strtol(p + 2, NULL, 10);
|
|
/* remove the port number and brackets from the address */
|
|
*p = '\0';
|
|
strncpy(server, server + 1, strlen(server));
|
|
}
|
|
}
|
|
else
|
|
{
|
|
/* dns name or IPv4 style address format - server.example.com:port or 1.2.3.4:port */
|
|
p = strchr(server, ':');
|
|
if (p != NULL)
|
|
{
|
|
g_tcp_port_rdp = strtol(p + 1, NULL, 10);
|
|
*p = 0;
|
|
}
|
|
}
|
|
#else /* no IPv6 support */
|
|
p = strchr(server, ':');
|
|
if (p != NULL)
|
|
{
|
|
g_tcp_port_rdp = strtol(p + 1, NULL, 10);
|
|
*p = 0;
|
|
}
|
|
#endif /* IPv6 */
|
|
|
|
}
|
|
|
|
/* Client program */
|
|
int
|
|
main(int argc, char *argv[])
|
|
{
|
|
char server[64];
|
|
char fullhostname[64];
|
|
char domain[256];
|
|
char password[64];
|
|
char shell[256];
|
|
char directory[256];
|
|
RD_BOOL reconnect_loop;
|
|
RD_BOOL prompt_password, deactivated;
|
|
struct passwd *pw;
|
|
uint32 flags, ext_disc_reason = 0;
|
|
char *p;
|
|
int c;
|
|
char *locale = NULL;
|
|
int username_option = 0;
|
|
RD_BOOL geometry_option = False;
|
|
#ifdef WITH_RDPSND
|
|
char *rdpsnd_optarg = NULL;
|
|
#endif
|
|
int longidx;
|
|
|
|
#ifdef HAVE_LOCALE_H
|
|
/* Set locale according to environment */
|
|
locale = setlocale(LC_ALL, "");
|
|
if (locale)
|
|
{
|
|
locale = xstrdup(locale);
|
|
}
|
|
|
|
#endif
|
|
|
|
/* Ignore SIGPIPE, since we are using popen() */
|
|
struct sigaction act;
|
|
memset(&act, 0, sizeof(act));
|
|
act.sa_handler = SIG_IGN;
|
|
sigemptyset(&act.sa_mask);
|
|
act.sa_flags = 0;
|
|
sigaction(SIGPIPE, &act, NULL);
|
|
|
|
flags = RDP_LOGON_NORMAL;
|
|
prompt_password = False;
|
|
g_seamless_spawn_cmd[0] = domain[0] = password[0] = shell[0] = directory[0] = 0;
|
|
g_embed_wnd = 0;
|
|
|
|
g_num_devices = 0;
|
|
|
|
#ifdef RDP2VNC
|
|
#define VNCOPT "V:Q:"
|
|
#else
|
|
#define VNCOPT
|
|
#endif
|
|
while ((c = getopt(argc, argv,
|
|
VNCOPT "A:u:L:d:s:c:p:n:k:g:o:fbBeEitmzCDKS:T:NX:a:x:Pr:045h?")) != -1)
|
|
{
|
|
switch (c)
|
|
{
|
|
#ifdef RDP2VNC
|
|
case 'V':
|
|
rfb_port = strtol(optarg, NULL, 10);
|
|
if (rfb_port < 100)
|
|
rfb_port += 5900;
|
|
break;
|
|
|
|
case 'Q':
|
|
defer_time = strtol(optarg, NULL, 10);
|
|
if (defer_time < 0)
|
|
defer_time = 0;
|
|
break;
|
|
#endif
|
|
|
|
case 'A':
|
|
g_seamless_rdp = True;
|
|
STRNCPY(g_seamless_shell, optarg, sizeof(g_seamless_shell));
|
|
break;
|
|
|
|
case 'u':
|
|
g_username = (char *) xmalloc(strlen(optarg) + 1);
|
|
STRNCPY(g_username, optarg, strlen(optarg) + 1);
|
|
username_option = 1;
|
|
break;
|
|
|
|
case 'L':
|
|
#ifdef HAVE_ICONV
|
|
STRNCPY(g_codepage, optarg, sizeof(g_codepage));
|
|
#else
|
|
error("iconv support not available\n");
|
|
#endif
|
|
break;
|
|
|
|
case 'd':
|
|
STRNCPY(domain, optarg, sizeof(domain));
|
|
break;
|
|
|
|
case 's':
|
|
STRNCPY(shell, optarg, sizeof(shell));
|
|
break;
|
|
|
|
case 'c':
|
|
STRNCPY(directory, optarg, sizeof(directory));
|
|
break;
|
|
|
|
case 'p':
|
|
if ((optarg[0] == '-') && (optarg[1] == 0))
|
|
{
|
|
prompt_password = True;
|
|
break;
|
|
}
|
|
|
|
STRNCPY(password, optarg, sizeof(password));
|
|
flags |= RDP_LOGON_AUTO;
|
|
|
|
/* try to overwrite argument so it won't appear in ps */
|
|
p = optarg;
|
|
while (*p)
|
|
*(p++) = 'X';
|
|
break;
|
|
#ifdef WITH_SCARD
|
|
case 'i':
|
|
flags |= RDP_LOGON_PASSWORD_IS_SC_PIN;
|
|
g_use_password_as_pin = True;
|
|
break;
|
|
#endif
|
|
case 't':
|
|
g_use_ctrl = False;
|
|
break;
|
|
|
|
case 'n':
|
|
STRNCPY(g_hostname, optarg, sizeof(g_hostname));
|
|
break;
|
|
|
|
case 'k':
|
|
STRNCPY(g_keymapname, optarg, sizeof(g_keymapname));
|
|
break;
|
|
|
|
case 'g':
|
|
geometry_option = True;
|
|
g_fullscreen = False;
|
|
if (!strcmp(optarg, "workarea"))
|
|
{
|
|
g_sizeopt = 1;
|
|
break;
|
|
}
|
|
|
|
g_width = strtol(optarg, &p, 10);
|
|
if (g_width <= 0)
|
|
{
|
|
error("invalid geometry\n");
|
|
return EX_USAGE;
|
|
}
|
|
|
|
if (*p == 'x')
|
|
g_height = strtol(p + 1, &p, 10);
|
|
|
|
if (g_height <= 0)
|
|
{
|
|
error("invalid geometry\n");
|
|
return EX_USAGE;
|
|
}
|
|
|
|
if (*p == '%')
|
|
{
|
|
g_sizeopt = -g_width;
|
|
g_width = 800;
|
|
p++;
|
|
}
|
|
|
|
if (*p == '+' || *p == '-')
|
|
{
|
|
g_pos |= (*p == '-') ? 2 : 1;
|
|
g_xpos = strtol(p, &p, 10);
|
|
|
|
}
|
|
if (*p == '+' || *p == '-')
|
|
{
|
|
g_pos |= (*p == '-') ? 4 : 1;
|
|
g_ypos = strtol(p, NULL, 10);
|
|
}
|
|
|
|
break;
|
|
|
|
case 'f':
|
|
g_fullscreen = True;
|
|
break;
|
|
|
|
case 'b':
|
|
g_bitmap_cache = False;
|
|
break;
|
|
|
|
case 'B':
|
|
g_ownbackstore = False;
|
|
break;
|
|
|
|
case 'e':
|
|
g_encryption = False;
|
|
break;
|
|
case 'E':
|
|
g_packet_encryption = False;
|
|
break;
|
|
case 'm':
|
|
g_sendmotion = False;
|
|
break;
|
|
|
|
case 'C':
|
|
g_owncolmap = True;
|
|
break;
|
|
|
|
case 'D':
|
|
g_hide_decorations = True;
|
|
break;
|
|
|
|
case 'K':
|
|
g_grab_keyboard = False;
|
|
break;
|
|
|
|
case 'S':
|
|
if (!strcmp(optarg, "standard"))
|
|
{
|
|
g_win_button_size = 18;
|
|
break;
|
|
}
|
|
|
|
g_win_button_size = strtol(optarg, &p, 10);
|
|
|
|
if (*p)
|
|
{
|
|
error("invalid button size\n");
|
|
return EX_USAGE;
|
|
}
|
|
|
|
break;
|
|
|
|
case 'T':
|
|
STRNCPY(g_title, optarg, sizeof(g_title));
|
|
break;
|
|
|
|
case 'N':
|
|
g_numlock_sync = True;
|
|
break;
|
|
|
|
case 'X':
|
|
g_embed_wnd = strtol(optarg, NULL, 0);
|
|
break;
|
|
|
|
case 'a':
|
|
g_server_depth = strtol(optarg, NULL, 10);
|
|
if (g_server_depth != 8 &&
|
|
g_server_depth != 16 &&
|
|
g_server_depth != 15 && g_server_depth != 24
|
|
&& g_server_depth != 32)
|
|
{
|
|
error("Invalid server colour depth.\n");
|
|
return EX_USAGE;
|
|
}
|
|
break;
|
|
|
|
case 'z':
|
|
DEBUG(("rdp compression enabled\n"));
|
|
flags |= (RDP_LOGON_COMPRESSION | RDP_LOGON_COMPRESSION2);
|
|
break;
|
|
|
|
case 'x':
|
|
if (str_startswith(optarg, "m")) /* modem */
|
|
{
|
|
g_rdp5_performanceflags =
|
|
RDP5_NO_WALLPAPER | RDP5_NO_FULLWINDOWDRAG |
|
|
RDP5_NO_MENUANIMATIONS | RDP5_NO_THEMING;
|
|
}
|
|
else if (str_startswith(optarg, "b")) /* broadband */
|
|
{
|
|
g_rdp5_performanceflags = RDP5_NO_WALLPAPER;
|
|
}
|
|
else if (str_startswith(optarg, "l")) /* lan */
|
|
{
|
|
g_rdp5_performanceflags = RDP5_DISABLE_NOTHING;
|
|
}
|
|
else
|
|
{
|
|
g_rdp5_performanceflags = strtol(optarg, NULL, 16);
|
|
}
|
|
break;
|
|
|
|
case 'P':
|
|
g_bitmap_cache_persist_enable = True;
|
|
break;
|
|
|
|
case 'r':
|
|
|
|
if (str_startswith(optarg, "sound"))
|
|
{
|
|
optarg += 5;
|
|
|
|
if (*optarg == ':')
|
|
{
|
|
optarg++;
|
|
while ((p = next_arg(optarg, ',')))
|
|
{
|
|
if (str_startswith(optarg, "remote"))
|
|
flags |= RDP_LOGON_LEAVE_AUDIO;
|
|
|
|
if (str_startswith(optarg, "local"))
|
|
#ifdef WITH_RDPSND
|
|
{
|
|
rdpsnd_optarg =
|
|
next_arg(optarg, ':');
|
|
g_rdpsnd = True;
|
|
}
|
|
|
|
#else
|
|
warning("Not compiled with sound support\n");
|
|
#endif
|
|
|
|
if (str_startswith(optarg, "off"))
|
|
#ifdef WITH_RDPSND
|
|
g_rdpsnd = False;
|
|
#else
|
|
warning("Not compiled with sound support\n");
|
|
#endif
|
|
|
|
optarg = p;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
#ifdef WITH_RDPSND
|
|
g_rdpsnd = True;
|
|
#else
|
|
warning("Not compiled with sound support\n");
|
|
#endif
|
|
}
|
|
}
|
|
else if (str_startswith(optarg, "disk"))
|
|
{
|
|
/* -r disk:h:=/mnt/floppy */
|
|
disk_enum_devices(&g_num_devices, optarg + 4);
|
|
}
|
|
else if (str_startswith(optarg, "comport"))
|
|
{
|
|
serial_enum_devices(&g_num_devices, optarg + 7);
|
|
}
|
|
else if (str_startswith(optarg, "lspci"))
|
|
{
|
|
g_lspci_enabled = True;
|
|
}
|
|
else if (str_startswith(optarg, "lptport"))
|
|
{
|
|
parallel_enum_devices(&g_num_devices, optarg + 7);
|
|
}
|
|
else if (str_startswith(optarg, "printer"))
|
|
{
|
|
printer_enum_devices(&g_num_devices, optarg + 7);
|
|
}
|
|
else if (str_startswith(optarg, "clientname"))
|
|
{
|
|
g_rdpdr_clientname = xmalloc(strlen(optarg + 11) + 1);
|
|
strcpy(g_rdpdr_clientname, optarg + 11);
|
|
}
|
|
else if (str_startswith(optarg, "clipboard"))
|
|
{
|
|
optarg += 9;
|
|
|
|
if (*optarg == ':')
|
|
{
|
|
optarg++;
|
|
|
|
if (str_startswith(optarg, "off"))
|
|
g_rdpclip = False;
|
|
else
|
|
cliprdr_set_mode(optarg);
|
|
}
|
|
else
|
|
g_rdpclip = True;
|
|
}
|
|
else if (strncmp("scard", optarg, 5) == 0)
|
|
{
|
|
#ifdef WITH_SCARD
|
|
scard_enum_devices(&g_num_devices, optarg + 5);
|
|
#else
|
|
warning("Not compiled with smartcard support\n");
|
|
#endif
|
|
}
|
|
else
|
|
{
|
|
warning("Unknown -r argument\n\n\tPossible arguments are: comport, disk, lptport, printer, sound, clipboard, scard\n");
|
|
}
|
|
break;
|
|
|
|
case '0':
|
|
g_console_session = True;
|
|
break;
|
|
|
|
case '4':
|
|
g_rdp_version = RDP_V4;
|
|
break;
|
|
|
|
case '5':
|
|
g_rdp_version = RDP_V5;
|
|
break;
|
|
#if WITH_SCARD
|
|
case 'o':
|
|
{
|
|
char *p = strchr(optarg, '=');
|
|
if (p == NULL)
|
|
{
|
|
warning("Skipping option '%s' specified, lacks name=value format.\n");
|
|
continue;
|
|
}
|
|
|
|
if (strncmp(optarg, "sc-csp-name", strlen("sc-scp-name")) ==
|
|
0)
|
|
g_sc_csp_name = strdup(p + 1);
|
|
else if (strncmp
|
|
(optarg, "sc-reader-name",
|
|
strlen("sc-reader-name")) == 0)
|
|
g_sc_reader_name = strdup(p + 1);
|
|
else if (strncmp
|
|
(optarg, "sc-card-name",
|
|
strlen("sc-card-name")) == 0)
|
|
g_sc_card_name = strdup(p + 1);
|
|
else if (strncmp
|
|
(optarg, "sc-container-name",
|
|
strlen("sc-container-name")) == 0)
|
|
g_sc_container_name = strdup(p + 1);
|
|
|
|
}
|
|
break;
|
|
#endif
|
|
case 'h':
|
|
case '?':
|
|
default:
|
|
usage(argv[0]);
|
|
return EX_USAGE;
|
|
}
|
|
}
|
|
|
|
if (argc - optind != 1)
|
|
{
|
|
usage(argv[0]);
|
|
return EX_USAGE;
|
|
}
|
|
|
|
STRNCPY(server, argv[optind], sizeof(server));
|
|
parse_server_and_port(server);
|
|
|
|
if (g_seamless_rdp)
|
|
{
|
|
if (shell[0])
|
|
STRNCPY(g_seamless_spawn_cmd, shell, sizeof(g_seamless_spawn_cmd));
|
|
|
|
STRNCPY(shell, g_seamless_shell, sizeof(shell));
|
|
|
|
if (g_win_button_size)
|
|
{
|
|
error("You cannot use -S and -A at the same time\n");
|
|
return EX_USAGE;
|
|
}
|
|
g_rdp5_performanceflags &= ~RDP5_NO_FULLWINDOWDRAG;
|
|
if (geometry_option)
|
|
{
|
|
error("You cannot use -g and -A at the same time\n");
|
|
return EX_USAGE;
|
|
}
|
|
if (g_fullscreen)
|
|
{
|
|
error("You cannot use -f and -A at the same time\n");
|
|
return EX_USAGE;
|
|
}
|
|
if (g_hide_decorations)
|
|
{
|
|
error("You cannot use -D and -A at the same time\n");
|
|
return EX_USAGE;
|
|
}
|
|
if (g_embed_wnd)
|
|
{
|
|
error("You cannot use -X and -A at the same time\n");
|
|
return EX_USAGE;
|
|
}
|
|
if (g_rdp_version < RDP_V5)
|
|
{
|
|
error("You cannot use -4 and -A at the same time\n");
|
|
return EX_USAGE;
|
|
}
|
|
g_sizeopt = -100;
|
|
g_grab_keyboard = False;
|
|
}
|
|
|
|
if (!username_option)
|
|
{
|
|
pw = getpwuid(getuid());
|
|
if ((pw == NULL) || (pw->pw_name == NULL))
|
|
{
|
|
error("could not determine username, use -u\n");
|
|
return EX_OSERR;
|
|
}
|
|
/* +1 for trailing \0 */
|
|
int pwlen = strlen(pw->pw_name) + 1;
|
|
g_username = (char *) xmalloc(pwlen);
|
|
STRNCPY(g_username, pw->pw_name, pwlen);
|
|
}
|
|
|
|
#ifdef HAVE_ICONV
|
|
if (g_codepage[0] == 0)
|
|
{
|
|
if (setlocale(LC_CTYPE, ""))
|
|
{
|
|
STRNCPY(g_codepage, nl_langinfo(CODESET), sizeof(g_codepage));
|
|
}
|
|
else
|
|
{
|
|
STRNCPY(g_codepage, DEFAULT_CODEPAGE, sizeof(g_codepage));
|
|
}
|
|
}
|
|
#endif
|
|
|
|
if (g_hostname[0] == 0)
|
|
{
|
|
if (gethostname(fullhostname, sizeof(fullhostname)) == -1)
|
|
{
|
|
error("could not determine local hostname, use -n\n");
|
|
return EX_OSERR;
|
|
}
|
|
|
|
p = strchr(fullhostname, '.');
|
|
if (p != NULL)
|
|
*p = 0;
|
|
|
|
STRNCPY(g_hostname, fullhostname, sizeof(g_hostname));
|
|
}
|
|
|
|
if (g_keymapname[0] == 0)
|
|
{
|
|
if (locale && xkeymap_from_locale(locale))
|
|
{
|
|
fprintf(stderr, "Autoselected keyboard map %s\n", g_keymapname);
|
|
}
|
|
else
|
|
{
|
|
STRNCPY(g_keymapname, "en-us", sizeof(g_keymapname));
|
|
}
|
|
}
|
|
if (locale)
|
|
xfree(locale);
|
|
|
|
|
|
if (prompt_password && read_password(password, sizeof(password)))
|
|
flags |= RDP_LOGON_AUTO;
|
|
|
|
if (g_title[0] == 0)
|
|
{
|
|
strcpy(g_title, "rdesktop - ");
|
|
strncat(g_title, server, sizeof(g_title) - sizeof("rdesktop - "));
|
|
}
|
|
|
|
#ifdef RDP2VNC
|
|
rdp2vnc_connect(server, flags, domain, password, shell, directory);
|
|
return EX_OK;
|
|
#else
|
|
|
|
/* Only startup ctrl functionality is seamless are used for now. */
|
|
if (g_use_ctrl && g_seamless_rdp)
|
|
{
|
|
if (ctrl_init(server, domain, g_username) < 0)
|
|
{
|
|
error("Failed to initialize ctrl mode.");
|
|
exit(1);
|
|
}
|
|
|
|
if (ctrl_is_slave())
|
|
{
|
|
fprintf(stdout,
|
|
"rdesktop in slave mode sending command to master process.\n");
|
|
|
|
if (g_seamless_spawn_cmd[0])
|
|
return ctrl_send_command("seamless.spawn", g_seamless_spawn_cmd);
|
|
|
|
fprintf(stdout, "No command specified to be spawn in seamless mode.\n");
|
|
return EX_USAGE;
|
|
}
|
|
}
|
|
|
|
if (!ui_init())
|
|
return EX_OSERR;
|
|
|
|
#ifdef WITH_RDPSND
|
|
if (g_rdpsnd)
|
|
{
|
|
if (!rdpsnd_init(rdpsnd_optarg))
|
|
warning("Initializing sound-support failed!\n");
|
|
}
|
|
#endif
|
|
|
|
if (g_lspci_enabled)
|
|
lspci_init();
|
|
|
|
rdpdr_init();
|
|
reconnect_loop = False;
|
|
while (1)
|
|
{
|
|
rdesktop_reset_state();
|
|
|
|
if (g_redirect)
|
|
{
|
|
STRNCPY(domain, g_redirect_domain, sizeof(domain));
|
|
xfree(g_username);
|
|
g_username = (char *) xmalloc(strlen(g_redirect_username) + 1);
|
|
STRNCPY(g_username, g_redirect_username, strlen(g_redirect_username) + 1);
|
|
STRNCPY(password, g_redirect_password, sizeof(password));
|
|
STRNCPY(server, g_redirect_server, sizeof(server));
|
|
flags |= RDP_LOGON_AUTO;
|
|
}
|
|
|
|
ui_init_connection();
|
|
if (!rdp_connect(server, flags, domain, password, shell, directory, g_redirect))
|
|
{
|
|
|
|
g_network_error = False;
|
|
|
|
if (reconnect_loop == False)
|
|
return EX_PROTOCOL;
|
|
|
|
/* check if auto reconnect cookie has timed out */
|
|
if (time(NULL) - g_reconnect_random_ts > (3600 + 600))
|
|
return EX_PROTOCOL;
|
|
|
|
fprintf(stderr, "Failed to connect, retry in 4 secs...\n");
|
|
sleep(4);
|
|
continue;
|
|
}
|
|
|
|
/* By setting encryption to False here, we have an encrypted login
|
|
packet but unencrypted transfer of other packets */
|
|
if (!g_packet_encryption)
|
|
g_encryption = False;
|
|
|
|
|
|
DEBUG(("Connection successful.\n"));
|
|
memset(password, 0, sizeof(password));
|
|
|
|
/* only create a window if we dont have one intialized */
|
|
if (!ui_have_window())
|
|
{
|
|
if (!ui_create_window())
|
|
return EX_OSERR;
|
|
}
|
|
|
|
g_redirect = False;
|
|
reconnect_loop = False;
|
|
rdp_main_loop(&deactivated, &ext_disc_reason);
|
|
|
|
DEBUG(("Disconnecting...\n"));
|
|
if (!tcp_is_connected())
|
|
rdp_disconnect();
|
|
|
|
if (g_redirect)
|
|
continue;
|
|
|
|
/* handle network error and start autoreconnect */
|
|
if (g_network_error)
|
|
{
|
|
g_network_error = False;
|
|
reconnect_loop = True;
|
|
continue;
|
|
}
|
|
|
|
ui_seamless_end();
|
|
ui_destroy_window();
|
|
|
|
/* Enter a reconnect loop if we have a pending resize request */
|
|
if (g_pending_resize)
|
|
{
|
|
g_pending_resize = False;
|
|
reconnect_loop = True;
|
|
continue;
|
|
}
|
|
break;
|
|
}
|
|
|
|
cache_save_state();
|
|
ui_deinit();
|
|
|
|
if (g_user_quit)
|
|
return EXRD_WINDOW_CLOSED;
|
|
|
|
return handle_disconnect_reason(deactivated, ext_disc_reason);
|
|
|
|
#endif
|
|
if (g_redirect_username)
|
|
xfree(g_redirect_username);
|
|
|
|
xfree(g_username);
|
|
}
|
|
|
|
#ifdef EGD_SOCKET
|
|
/* Read 32 random bytes from PRNGD or EGD socket (based on OpenSSL RAND_egd) */
|
|
static RD_BOOL
|
|
generate_random_egd(uint8 * buf)
|
|
{
|
|
struct sockaddr_un addr;
|
|
RD_BOOL ret = False;
|
|
int fd;
|
|
|
|
fd = socket(AF_UNIX, SOCK_STREAM, 0);
|
|
if (fd == -1)
|
|
return False;
|
|
|
|
addr.sun_family = AF_UNIX;
|
|
memcpy(addr.sun_path, EGD_SOCKET, sizeof(EGD_SOCKET));
|
|
if (connect(fd, (struct sockaddr *) &addr, sizeof(addr)) == -1)
|
|
goto err;
|
|
|
|
/* PRNGD and EGD use a simple communications protocol */
|
|
buf[0] = 1; /* Non-blocking (similar to /dev/urandom) */
|
|
buf[1] = 32; /* Number of requested random bytes */
|
|
if (write(fd, buf, 2) != 2)
|
|
goto err;
|
|
|
|
if ((read(fd, buf, 1) != 1) || (buf[0] == 0)) /* Available? */
|
|
goto err;
|
|
|
|
if (read(fd, buf, 32) != 32)
|
|
goto err;
|
|
|
|
ret = True;
|
|
|
|
err:
|
|
close(fd);
|
|
return ret;
|
|
}
|
|
#endif
|
|
|
|
/* Generate a 32-byte random for the secure transport code. */
|
|
void
|
|
generate_random(uint8 * random)
|
|
{
|
|
struct stat st;
|
|
struct tms tmsbuf;
|
|
RDSSL_MD5 md5;
|
|
uint32 *r;
|
|
int fd, n;
|
|
|
|
/* If we have a kernel random device, try that first */
|
|
if (((fd = open("/dev/urandom", O_RDONLY)) != -1)
|
|
|| ((fd = open("/dev/random", O_RDONLY)) != -1))
|
|
{
|
|
n = read(fd, random, 32);
|
|
close(fd);
|
|
if (n == 32)
|
|
return;
|
|
}
|
|
|
|
#ifdef EGD_SOCKET
|
|
/* As a second preference use an EGD */
|
|
if (generate_random_egd(random))
|
|
return;
|
|
#endif
|
|
|
|
/* Otherwise use whatever entropy we can gather - ideas welcome. */
|
|
r = (uint32 *) random;
|
|
r[0] = (getpid()) | (getppid() << 16);
|
|
r[1] = (getuid()) | (getgid() << 16);
|
|
r[2] = times(&tmsbuf); /* system uptime (clocks) */
|
|
gettimeofday((struct timeval *) &r[3], NULL); /* sec and usec */
|
|
stat("/tmp", &st);
|
|
r[5] = st.st_atime;
|
|
r[6] = st.st_mtime;
|
|
r[7] = st.st_ctime;
|
|
|
|
/* Hash both halves with MD5 to obscure possible patterns */
|
|
rdssl_md5_init(&md5);
|
|
rdssl_md5_update(&md5, random, 16);
|
|
rdssl_md5_final(&md5, random);
|
|
rdssl_md5_update(&md5, random + 16, 16);
|
|
rdssl_md5_final(&md5, random + 16);
|
|
}
|
|
|
|
/* malloc; exit if out of memory */
|
|
void *
|
|
xmalloc(int size)
|
|
{
|
|
void *mem = malloc(size);
|
|
if (mem == NULL)
|
|
{
|
|
error("xmalloc %d\n", size);
|
|
exit(EX_UNAVAILABLE);
|
|
}
|
|
return mem;
|
|
}
|
|
|
|
/* Exit on NULL pointer. Use to verify result from XGetImage etc */
|
|
void
|
|
exit_if_null(void *ptr)
|
|
{
|
|
if (ptr == NULL)
|
|
{
|
|
error("unexpected null pointer. Out of memory?\n");
|
|
exit(EX_UNAVAILABLE);
|
|
}
|
|
}
|
|
|
|
/* strdup */
|
|
char *
|
|
xstrdup(const char *s)
|
|
{
|
|
char *mem = strdup(s);
|
|
if (mem == NULL)
|
|
{
|
|
perror("strdup");
|
|
exit(EX_UNAVAILABLE);
|
|
}
|
|
return mem;
|
|
}
|
|
|
|
/* realloc; exit if out of memory */
|
|
void *
|
|
xrealloc(void *oldmem, size_t size)
|
|
{
|
|
void *mem;
|
|
|
|
if (size == 0)
|
|
size = 1;
|
|
mem = realloc(oldmem, size);
|
|
if (mem == NULL)
|
|
{
|
|
error("xrealloc %ld\n", size);
|
|
exit(EX_UNAVAILABLE);
|
|
}
|
|
return mem;
|
|
}
|
|
|
|
/* free */
|
|
void
|
|
xfree(void *mem)
|
|
{
|
|
free(mem);
|
|
}
|
|
|
|
/* report an error */
|
|
void
|
|
error(char *format, ...)
|
|
{
|
|
va_list ap;
|
|
|
|
fprintf(stderr, "ERROR: ");
|
|
|
|
va_start(ap, format);
|
|
vfprintf(stderr, format, ap);
|
|
va_end(ap);
|
|
}
|
|
|
|
/* report a warning */
|
|
void
|
|
warning(char *format, ...)
|
|
{
|
|
va_list ap;
|
|
|
|
fprintf(stderr, "WARNING: ");
|
|
|
|
va_start(ap, format);
|
|
vfprintf(stderr, format, ap);
|
|
va_end(ap);
|
|
}
|
|
|
|
/* report an unimplemented protocol feature */
|
|
void
|
|
unimpl(char *format, ...)
|
|
{
|
|
va_list ap;
|
|
|
|
fprintf(stderr, "NOT IMPLEMENTED: ");
|
|
|
|
va_start(ap, format);
|
|
vfprintf(stderr, format, ap);
|
|
va_end(ap);
|
|
}
|
|
|
|
/* produce a hex dump */
|
|
void
|
|
hexdump(unsigned char *p, unsigned int len)
|
|
{
|
|
unsigned char *line = p;
|
|
int i, thisline, offset = 0;
|
|
|
|
while (offset < len)
|
|
{
|
|
printf("%04x ", offset);
|
|
thisline = len - offset;
|
|
if (thisline > 16)
|
|
thisline = 16;
|
|
|
|
for (i = 0; i < thisline; i++)
|
|
printf("%02x ", line[i]);
|
|
|
|
for (; i < 16; i++)
|
|
printf(" ");
|
|
|
|
for (i = 0; i < thisline; i++)
|
|
printf("%c", (line[i] >= 0x20 && line[i] < 0x7f) ? line[i] : '.');
|
|
|
|
printf("\n");
|
|
offset += thisline;
|
|
line += thisline;
|
|
}
|
|
}
|
|
|
|
/*
|
|
input: src is the string we look in for needle.
|
|
Needle may be escaped by a backslash, in
|
|
that case we ignore that particular needle.
|
|
return value: returns next src pointer, for
|
|
succesive executions, like in a while loop
|
|
if retval is 0, then there are no more args.
|
|
pitfalls:
|
|
src is modified. 0x00 chars are inserted to
|
|
terminate strings.
|
|
return val, points on the next val chr after ins
|
|
0x00
|
|
|
|
example usage:
|
|
while( (pos = next_arg( optarg, ',')) ){
|
|
printf("%s\n",optarg);
|
|
optarg=pos;
|
|
}
|
|
|
|
*/
|
|
char *
|
|
next_arg(char *src, char needle)
|
|
{
|
|
char *nextval;
|
|
char *p;
|
|
char *mvp = 0;
|
|
|
|
/* EOS */
|
|
if (*src == (char) 0x00)
|
|
return 0;
|
|
|
|
p = src;
|
|
/* skip escaped needles */
|
|
while ((nextval = strchr(p, needle)))
|
|
{
|
|
mvp = nextval - 1;
|
|
/* found backslashed needle */
|
|
if (*mvp == '\\' && (mvp > src))
|
|
{
|
|
/* move string one to the left */
|
|
while (*(mvp + 1) != (char) 0x00)
|
|
{
|
|
*mvp = *(mvp + 1);
|
|
mvp++;
|
|
}
|
|
*mvp = (char) 0x00;
|
|
p = nextval;
|
|
}
|
|
else
|
|
{
|
|
p = nextval + 1;
|
|
break;
|
|
}
|
|
|
|
}
|
|
|
|
/* more args available */
|
|
if (nextval)
|
|
{
|
|
*nextval = (char) 0x00;
|
|
return ++nextval;
|
|
}
|
|
|
|
/* no more args after this, jump to EOS */
|
|
nextval = src + strlen(src);
|
|
return nextval;
|
|
}
|
|
|
|
|
|
void
|
|
toupper_str(char *p)
|
|
{
|
|
while (*p)
|
|
{
|
|
if ((*p >= 'a') && (*p <= 'z'))
|
|
*p = toupper((int) *p);
|
|
p++;
|
|
}
|
|
}
|
|
|
|
|
|
RD_BOOL
|
|
str_startswith(const char *s, const char *prefix)
|
|
{
|
|
return (strncmp(s, prefix, strlen(prefix)) == 0);
|
|
}
|
|
|
|
|
|
/* Split input into lines, and call linehandler for each
|
|
line. Incomplete lines are saved in the rest variable, which should
|
|
initially point to NULL. When linehandler returns False, stop and
|
|
return False. Otherwise, return True. */
|
|
RD_BOOL
|
|
str_handle_lines(const char *input, char **rest, str_handle_lines_t linehandler, void *data)
|
|
{
|
|
char *buf, *p;
|
|
char *oldrest;
|
|
size_t inputlen;
|
|
size_t buflen;
|
|
size_t restlen = 0;
|
|
RD_BOOL ret = True;
|
|
|
|
/* Copy data to buffer */
|
|
inputlen = strlen(input);
|
|
if (*rest)
|
|
restlen = strlen(*rest);
|
|
buflen = restlen + inputlen + 1;
|
|
buf = (char *) xmalloc(buflen);
|
|
buf[0] = '\0';
|
|
if (*rest)
|
|
STRNCPY(buf, *rest, buflen);
|
|
strncat(buf, input, inputlen);
|
|
p = buf;
|
|
|
|
while (1)
|
|
{
|
|
char *newline = strchr(p, '\n');
|
|
if (newline)
|
|
{
|
|
*newline = '\0';
|
|
if (!linehandler(p, data))
|
|
{
|
|
p = newline + 1;
|
|
ret = False;
|
|
break;
|
|
}
|
|
p = newline + 1;
|
|
}
|
|
else
|
|
{
|
|
break;
|
|
|
|
}
|
|
}
|
|
|
|
/* Save in rest */
|
|
oldrest = *rest;
|
|
restlen = buf + buflen - p;
|
|
*rest = (char *) xmalloc(restlen);
|
|
STRNCPY((*rest), p, restlen);
|
|
xfree(oldrest);
|
|
|
|
xfree(buf);
|
|
return ret;
|
|
}
|
|
|
|
/* Execute the program specified by argv. For each line in
|
|
stdout/stderr output, call linehandler. Returns false on failure. */
|
|
RD_BOOL
|
|
subprocess(char *const argv[], str_handle_lines_t linehandler, void *data)
|
|
{
|
|
pid_t child;
|
|
int fd[2];
|
|
int n = 1;
|
|
char output[256];
|
|
char *rest = NULL;
|
|
|
|
if (pipe(fd) < 0)
|
|
{
|
|
perror("pipe");
|
|
return False;
|
|
}
|
|
|
|
if ((child = fork()) < 0)
|
|
{
|
|
perror("fork");
|
|
return False;
|
|
}
|
|
|
|
/* Child */
|
|
if (child == 0)
|
|
{
|
|
/* Close read end */
|
|
close(fd[0]);
|
|
|
|
/* Redirect stdout and stderr to pipe */
|
|
dup2(fd[1], 1);
|
|
dup2(fd[1], 2);
|
|
|
|
/* Execute */
|
|
execvp(argv[0], argv);
|
|
perror("Error executing child");
|
|
_exit(128);
|
|
}
|
|
|
|
/* Parent. Close write end. */
|
|
close(fd[1]);
|
|
while (n > 0)
|
|
{
|
|
n = read(fd[0], output, 255);
|
|
output[n] = '\0';
|
|
str_handle_lines(output, &rest, linehandler, data);
|
|
}
|
|
xfree(rest);
|
|
|
|
return True;
|
|
}
|
|
|
|
|
|
/* not all clibs got ltoa */
|
|
#define LTOA_BUFSIZE (sizeof(long) * 8 + 1)
|
|
|
|
char *
|
|
l_to_a(long N, int base)
|
|
{
|
|
static char ret[LTOA_BUFSIZE];
|
|
|
|
char *head = ret, buf[LTOA_BUFSIZE], *tail = buf + sizeof(buf);
|
|
|
|
register int divrem;
|
|
|
|
if (base < 36 || 2 > base)
|
|
base = 10;
|
|
|
|
if (N < 0)
|
|
{
|
|
*head++ = '-';
|
|
N = -N;
|
|
}
|
|
|
|
tail = buf + sizeof(buf);
|
|
*--tail = 0;
|
|
|
|
do
|
|
{
|
|
divrem = N % base;
|
|
*--tail = (divrem <= 9) ? divrem + '0' : divrem + 'a' - 10;
|
|
N /= base;
|
|
}
|
|
while (N);
|
|
|
|
strcpy(head, tail);
|
|
return ret;
|
|
}
|
|
|
|
int
|
|
load_licence(unsigned char **data)
|
|
{
|
|
uint8 ho[20], hi[16];
|
|
char *home, path[PATH_MAX], hash[41];
|
|
struct stat st;
|
|
int fd, length;
|
|
|
|
home = getenv("HOME");
|
|
if (home == NULL)
|
|
return -1;
|
|
|
|
snprintf((char *) hi, 16, "%s", g_hostname);
|
|
sec_hash_sha1_16(ho, hi, g_static_rdesktop_salt_16);
|
|
sec_hash_to_string(hash, sizeof(hash), ho, sizeof(ho));
|
|
|
|
snprintf(path, PATH_MAX, "%s" RDESKTOP_LICENSE_STORE "/%s.cal", home, hash);
|
|
path[sizeof(path) - 1] = '\0';
|
|
|
|
fd = open(path, O_RDONLY);
|
|
if (fd == -1)
|
|
{
|
|
/* fallback to try reading old license file */
|
|
snprintf(path, PATH_MAX, "%s/.rdesktop/license.%s", home, g_hostname);
|
|
path[sizeof(path) - 1] = '\0';
|
|
if ((fd = open(path, O_RDONLY)) == -1)
|
|
return -1;
|
|
}
|
|
|
|
if (fstat(fd, &st))
|
|
{
|
|
close(fd);
|
|
return -1;
|
|
}
|
|
|
|
*data = (uint8 *) xmalloc(st.st_size);
|
|
length = read(fd, *data, st.st_size);
|
|
close(fd);
|
|
return length;
|
|
}
|
|
|
|
void
|
|
save_licence(unsigned char *data, int length)
|
|
{
|
|
uint8 ho[20], hi[16];
|
|
char *home, path[PATH_MAX], tmppath[PATH_MAX], hash[41];
|
|
int fd;
|
|
|
|
home = getenv("HOME");
|
|
if (home == NULL)
|
|
return;
|
|
|
|
snprintf(path, PATH_MAX, "%s" RDESKTOP_LICENSE_STORE, home);
|
|
path[sizeof(path) - 1] = '\0';
|
|
if (utils_mkdir_p(path, 0700) == -1)
|
|
{
|
|
perror(path);
|
|
return;
|
|
}
|
|
|
|
snprintf((char *) hi, 16, "%s", g_hostname);
|
|
sec_hash_sha1_16(ho, hi, g_static_rdesktop_salt_16);
|
|
sec_hash_to_string(hash, sizeof(hash), ho, sizeof(ho));
|
|
|
|
/* write licence to {sha1}.cal.new, then atomically
|
|
rename to {sha1}.cal */
|
|
snprintf(path, PATH_MAX, "%s" RDESKTOP_LICENSE_STORE "/%s.cal", home, hash);
|
|
path[sizeof(path) - 1] = '\0';
|
|
|
|
snprintf(tmppath, PATH_MAX, "%s.new", path);
|
|
path[sizeof(path) - 1] = '\0';
|
|
|
|
fd = open(tmppath, O_WRONLY | O_CREAT | O_TRUNC, 0600);
|
|
if (fd == -1)
|
|
{
|
|
perror(tmppath);
|
|
return;
|
|
}
|
|
|
|
if (write(fd, data, length) != length)
|
|
{
|
|
perror(tmppath);
|
|
unlink(tmppath);
|
|
}
|
|
else if (rename(tmppath, path) == -1)
|
|
{
|
|
perror(path);
|
|
unlink(tmppath);
|
|
}
|
|
|
|
close(fd);
|
|
}
|
|
|
|
/* Create the bitmap cache directory */
|
|
RD_BOOL
|
|
rd_pstcache_mkdir(void)
|
|
{
|
|
char *home;
|
|
char bmpcache_dir[256];
|
|
|
|
home = getenv("HOME");
|
|
|
|
if (home == NULL)
|
|
return False;
|
|
|
|
sprintf(bmpcache_dir, "%s/%s", home, ".rdesktop");
|
|
|
|
if ((mkdir(bmpcache_dir, S_IRWXU) == -1) && errno != EEXIST)
|
|
{
|
|
perror(bmpcache_dir);
|
|
return False;
|
|
}
|
|
|
|
sprintf(bmpcache_dir, "%s/%s", home, ".rdesktop/cache");
|
|
|
|
if ((mkdir(bmpcache_dir, S_IRWXU) == -1) && errno != EEXIST)
|
|
{
|
|
perror(bmpcache_dir);
|
|
return False;
|
|
}
|
|
|
|
return True;
|
|
}
|
|
|
|
/* open a file in the .rdesktop directory */
|
|
int
|
|
rd_open_file(char *filename)
|
|
{
|
|
char *home;
|
|
char fn[256];
|
|
int fd;
|
|
|
|
home = getenv("HOME");
|
|
if (home == NULL)
|
|
return -1;
|
|
sprintf(fn, "%s/.rdesktop/%s", home, filename);
|
|
fd = open(fn, O_RDWR | O_CREAT, S_IRUSR | S_IWUSR);
|
|
if (fd == -1)
|
|
perror(fn);
|
|
return fd;
|
|
}
|
|
|
|
/* close file */
|
|
void
|
|
rd_close_file(int fd)
|
|
{
|
|
close(fd);
|
|
}
|
|
|
|
/* read from file*/
|
|
int
|
|
rd_read_file(int fd, void *ptr, int len)
|
|
{
|
|
return read(fd, ptr, len);
|
|
}
|
|
|
|
/* write to file */
|
|
int
|
|
rd_write_file(int fd, void *ptr, int len)
|
|
{
|
|
return write(fd, ptr, len);
|
|
}
|
|
|
|
/* move file pointer */
|
|
int
|
|
rd_lseek_file(int fd, int offset)
|
|
{
|
|
return lseek(fd, offset, SEEK_SET);
|
|
}
|
|
|
|
/* do a write lock on a file */
|
|
RD_BOOL
|
|
rd_lock_file(int fd, int start, int len)
|
|
{
|
|
struct flock lock;
|
|
|
|
lock.l_type = F_WRLCK;
|
|
lock.l_whence = SEEK_SET;
|
|
lock.l_start = start;
|
|
lock.l_len = len;
|
|
if (fcntl(fd, F_SETLK, &lock) == -1)
|
|
return False;
|
|
return True;
|
|
}
|