blob: e51c8919e8d0121cc96db1673df8fd15be8d6602 [file] [log] [blame]
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +00001/* Copyright (C) 2002-2005 RealVNC Ltd. All Rights Reserved.
Adam Tkacdf799702010-04-28 15:45:53 +00002 * Copyright (C) 2010 TigerVNC Team
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +00003 *
4 * This is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License as published by
6 * the Free Software Foundation; either version 2 of the License, or
7 * (at your option) any later version.
8 *
9 * This software is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
13 *
14 * You should have received a copy of the GNU General Public License
15 * along with this software; if not, write to the Free Software
16 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307,
17 * USA.
18 */
Adam Tkacdf799702010-04-28 15:45:53 +000019
20#ifdef HAVE_CONFIG_H
21#include <config.h>
22#endif
23
Adam Tkac1d15e2d2010-04-23 14:06:38 +000024#include <assert.h>
25#include <stdlib.h>
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +000026#include <string.h>
27#ifdef _WIN32
28#define strcasecmp _stricmp
29#endif
Adam Tkacc210e8a2010-04-23 14:09:16 +000030#include <rfb/CSecurityNone.h>
Adam Tkac707d3612010-07-20 15:16:10 +000031#include <rfb/CSecurityStack.h>
Adam Tkacb10489b2010-04-23 14:16:04 +000032#include <rfb/CSecurityVeNCrypt.h>
Adam Tkacc210e8a2010-04-23 14:09:16 +000033#include <rfb/CSecurityVncAuth.h>
Adam Tkac8c048382010-09-02 12:37:00 +000034#include <rfb/CSecurityPlain.h>
Adam Tkac1d15e2d2010-04-23 14:06:38 +000035#include <rdr/Exception.h>
36#include <rfb/LogWriter.h>
Adam Tkacb6eb3992010-04-23 14:05:00 +000037#include <rfb/Security.h>
Adam Tkac1d15e2d2010-04-23 14:06:38 +000038#include <rfb/SSecurityNone.h>
Adam Tkac707d3612010-07-20 15:16:10 +000039#include <rfb/SSecurityStack.h>
Adam Tkac520fc412010-09-02 14:13:24 +000040#include <rfb/SSecurityPlain.h>
Adam Tkac1d15e2d2010-04-23 14:06:38 +000041#include <rfb/SSecurityVncAuth.h>
Adam Tkacdfe19cf2010-04-23 14:14:11 +000042#include <rfb/SSecurityVeNCrypt.h>
Adam Tkac707d3612010-07-20 15:16:10 +000043#ifdef HAVE_GNUTLS
Adam Tkac3c5be392010-07-21 09:27:34 +000044#include <rfb/CSecurityTLS.h>
Adam Tkac21b61a52010-07-21 09:19:00 +000045#include <rfb/SSecurityTLS.h>
Adam Tkacdf799702010-04-28 15:45:53 +000046#endif
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +000047#include <rfb/util.h>
48
Adam Tkac1d15e2d2010-04-23 14:06:38 +000049using namespace rdr;
50using namespace rfb;
51using namespace std;
52
53static LogWriter vlog("Security");
54
Adam Tkacbfd66c12010-10-01 08:33:29 +000055Security::Security(StringParameter &secTypes)
Adam Tkac1d15e2d2010-04-23 14:06:38 +000056{
Adam Tkacfb993152010-08-12 14:17:28 +000057 char *secTypesStr;
58
Adam Tkacbfd66c12010-10-01 08:33:29 +000059 secTypesStr = secTypes.getData();
Adam Tkac1d15e2d2010-04-23 14:06:38 +000060 enabledSecTypes = parseSecTypes(secTypesStr);
61
62 delete secTypesStr;
63}
64
Adam Tkac0c77e512010-07-20 15:10:16 +000065const std::list<rdr::U8> Security::GetEnabledSecTypes(void)
Adam Tkac1d15e2d2010-04-23 14:06:38 +000066{
Adam Tkac0c77e512010-07-20 15:10:16 +000067 list<rdr::U8> result;
68 list<U32>::iterator i;
69
DRC674bf062011-02-21 13:14:16 +000070 result.push_back(secTypeVeNCrypt);
Adam Tkac0c77e512010-07-20 15:10:16 +000071 for (i = enabledSecTypes.begin(); i != enabledSecTypes.end(); i++)
72 if (*i < 0x100)
73 result.push_back(*i);
74
75 return result;
76}
77
78const std::list<rdr::U32> Security::GetEnabledExtSecTypes(void)
79{
80 list<rdr::U32> result;
81 list<U32>::iterator i;
82
83 for (i = enabledSecTypes.begin(); i != enabledSecTypes.end(); i++)
Adam Tkac95e2fe82010-08-12 13:54:59 +000084 if (*i != secTypeVeNCrypt) /* Do not include VeNCrypt type to avoid loops */
Adam Tkac0c77e512010-07-20 15:10:16 +000085 result.push_back(*i);
86
87 return result;
88}
89
90void Security::EnableSecType(U32 secType)
91{
92 list<U32>::iterator i;
Adam Tkac1d15e2d2010-04-23 14:06:38 +000093
94 for (i = enabledSecTypes.begin(); i != enabledSecTypes.end(); i++)
95 if (*i == secType)
96 return;
97
98 enabledSecTypes.push_back(secType);
99}
100
Adam Tkac0c77e512010-07-20 15:10:16 +0000101bool Security::IsSupported(U32 secType)
Adam Tkac1d15e2d2010-04-23 14:06:38 +0000102{
Adam Tkac0c77e512010-07-20 15:10:16 +0000103 list<U32>::iterator i;
Adam Tkac1d15e2d2010-04-23 14:06:38 +0000104
105 for (i = enabledSecTypes.begin(); i != enabledSecTypes.end(); i++)
106 if (*i == secType)
107 return true;
DRC674bf062011-02-21 13:14:16 +0000108 if (secType == secTypeVeNCrypt)
109 return true;
Adam Tkac1d15e2d2010-04-23 14:06:38 +0000110
111 return false;
112}
113
Adam Tkaca9a7b4b2011-02-01 14:34:55 +0000114char *Security::ToString(void)
115{
116 list<U32>::iterator i;
117 static char out[128]; /* Should be enough */
118 bool firstpass = true;
119 const char *name;
120
121 memset(out, 0, sizeof(out));
122
123 for (i = enabledSecTypes.begin(); i != enabledSecTypes.end(); i++) {
124 name = secTypeName(*i);
125 if (name[0] == '[') /* Unknown security type */
126 continue;
127
128 if (!firstpass)
129 strncat(out, ",", sizeof(out) - 1);
130 else
131 firstpass = false;
132 strncat(out, name, sizeof(out) - 1);
133 }
134
135 return out;
136}
137
Adam Tkac0c77e512010-07-20 15:10:16 +0000138rdr::U32 rfb::secTypeNum(const char* name)
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +0000139{
140 if (strcasecmp(name, "None") == 0) return secTypeNone;
141 if (strcasecmp(name, "VncAuth") == 0) return secTypeVncAuth;
142 if (strcasecmp(name, "Tight") == 0) return secTypeTight;
143 if (strcasecmp(name, "RA2") == 0) return secTypeRA2;
144 if (strcasecmp(name, "RA2ne") == 0) return secTypeRA2ne;
145 if (strcasecmp(name, "SSPI") == 0) return secTypeSSPI;
Adam Tkacdfe19cf2010-04-23 14:14:11 +0000146 if (strcasecmp(name, "SSPIne") == 0) return secTypeSSPIne;
147 if (strcasecmp(name, "VeNCrypt") == 0) return secTypeVeNCrypt;
Adam Tkacb3e60c62010-07-20 15:10:59 +0000148
149 /* VeNCrypt subtypes */
Adam Tkac957a5ae2010-07-20 15:12:41 +0000150 if (strcasecmp(name, "Plain") == 0) return secTypePlain;
Adam Tkacb3e60c62010-07-20 15:10:59 +0000151 if (strcasecmp(name, "TLSNone") == 0) return secTypeTLSNone;
152 if (strcasecmp(name, "TLSVnc") == 0) return secTypeTLSVnc;
Adam Tkac957a5ae2010-07-20 15:12:41 +0000153 if (strcasecmp(name, "TLSPlain") == 0) return secTypeTLSPlain;
Adam Tkacb3e60c62010-07-20 15:10:59 +0000154 if (strcasecmp(name, "X509None") == 0) return secTypeX509None;
155 if (strcasecmp(name, "X509Vnc") == 0) return secTypeX509Vnc;
Adam Tkacb3e60c62010-07-20 15:10:59 +0000156 if (strcasecmp(name, "X509Plain") == 0) return secTypeX509Plain;
Adam Tkacb3e60c62010-07-20 15:10:59 +0000157
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +0000158 return secTypeInvalid;
159}
160
Adam Tkac0c77e512010-07-20 15:10:16 +0000161const char* rfb::secTypeName(rdr::U32 num)
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +0000162{
163 switch (num) {
164 case secTypeNone: return "None";
165 case secTypeVncAuth: return "VncAuth";
166 case secTypeTight: return "Tight";
167 case secTypeRA2: return "RA2";
168 case secTypeRA2ne: return "RA2ne";
169 case secTypeSSPI: return "SSPI";
170 case secTypeSSPIne: return "SSPIne";
Adam Tkacdfe19cf2010-04-23 14:14:11 +0000171 case secTypeVeNCrypt: return "VeNCrypt";
Adam Tkacb3e60c62010-07-20 15:10:59 +0000172
173 /* VeNCrypt subtypes */
Adam Tkac957a5ae2010-07-20 15:12:41 +0000174 case secTypePlain: return "Plain";
Adam Tkacb3e60c62010-07-20 15:10:59 +0000175 case secTypeTLSNone: return "TLSNone";
176 case secTypeTLSVnc: return "TLSVnc";
Adam Tkacb3e60c62010-07-20 15:10:59 +0000177 case secTypeTLSPlain: return "TLSPlain";
178 case secTypeX509None: return "X509None";
179 case secTypeX509Vnc: return "X509Vnc";
180 case secTypeX509Plain: return "X509Plain";
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +0000181 default: return "[unknown secType]";
182 }
183}
184
Adam Tkac0c77e512010-07-20 15:10:16 +0000185std::list<rdr::U32> rfb::parseSecTypes(const char* types_)
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +0000186{
Adam Tkac0c77e512010-07-20 15:10:16 +0000187 std::list<rdr::U32> result;
Adam Tkacd36b6262009-09-04 10:57:20 +0000188 CharArray types(strDup(types_)), type;
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +0000189 while (types.buf) {
190 strSplit(types.buf, ',', &type.buf, &types.buf);
Adam Tkac0c77e512010-07-20 15:10:16 +0000191 rdr::U32 typeNum = secTypeNum(type.buf);
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +0000192 if (typeNum != secTypeInvalid)
193 result.push_back(typeNum);
194 }
195 return result;
196}