123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124 |
- /* Copyright (C) 2005 Martin Koegler
- * Copyright (C) 2006 OCCAM Financial Technology
- *
- * This is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * This software is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this software; if not, write to the Free Software
- * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307,
- * USA.
- */
-
- #ifdef HAVE_CONFIG_H
- #include <config.h>
- #endif
-
- #include <rfb/SSecurityPlain.h>
- #include <rfb/SConnection.h>
- #include <rfb/Exception.h>
- #include <rdr/InStream.h>
- #if !defined(WIN32) && !defined(__APPLE__)
- #include <rfb/UnixPasswordValidator.h>
- #endif
- #ifdef WIN32
- #include <rfb/WinPasswdValidator.h>
- #endif
-
- using namespace rfb;
-
- StringParameter PasswordValidator::plainUsers
- ("PlainUsers",
- "Users permitted to access via Plain security type (including TLSPlain, X509Plain etc.)"
- #ifdef HAVE_NETTLE
- " or RSA-AES security types (RA2, RA2ne, RA2_256, RA2ne_256)"
- #endif
- ,
- "");
-
- bool PasswordValidator::validUser(const char* username)
- {
- CharArray users(plainUsers.getValueStr()), user;
-
- while (users.buf) {
- strSplit(users.buf, ',', &user.buf, &users.buf);
- #ifdef WIN32
- if (0 == stricmp(user.buf, "*"))
- return true;
- if (0 == stricmp(user.buf, username))
- return true;
- #else
- if (!strcmp(user.buf, "*"))
- return true;
- if (!strcmp(user.buf, username))
- return true;
- #endif
- }
- return false;
- }
-
- SSecurityPlain::SSecurityPlain(SConnection* sc) : SSecurity(sc)
- {
- #ifdef WIN32
- valid = new WinPasswdValidator();
- #elif !defined(__APPLE__)
- valid = new UnixPasswordValidator();
- #else
- valid = NULL;
- #endif
-
- state = 0;
- }
-
- bool SSecurityPlain::processMsg()
- {
- rdr::InStream* is = sc->getInStream();
- char* pw;
- char *uname;
- CharArray password;
-
- if (!valid)
- throw AuthFailureException("No password validator configured");
-
- if (state == 0) {
- if (!is->hasData(8))
- return false;
-
- ulen = is->readU32();
- if (ulen > MaxSaneUsernameLength)
- throw AuthFailureException("Too long username");
-
- plen = is->readU32();
- if (plen > MaxSanePasswordLength)
- throw AuthFailureException("Too long password");
-
- state = 1;
- }
-
- if (state == 1) {
- if (!is->hasData(ulen + plen))
- return false;
- state = 2;
- pw = new char[plen + 1];
- uname = new char[ulen + 1];
- username.replaceBuf(uname);
- password.replaceBuf(pw);
- is->readBytes(uname, ulen);
- is->readBytes(pw, plen);
- pw[plen] = 0;
- uname[ulen] = 0;
- plen = 0;
- if (!valid->validate(sc, uname, pw))
- throw AuthFailureException("invalid password or username");
- }
-
- return true;
- }
|