/* Copyright (C) 2005 Martin Koegler * Copyright (C) 2006 OCCAM Financial Technology * * This is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This software is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this software; if not, write to the Free Software * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, * USA. */ #ifdef HAVE_CONFIG_H #include #endif #include #include #include #include #include #if !defined(WIN32) && !defined(__APPLE__) #include #endif #ifdef WIN32 #include #endif using namespace rfb; StringParameter PasswordValidator::plainUsers ("PlainUsers", "Users permitted to access via Plain security type (including TLSPlain, X509Plain etc.)" #ifdef HAVE_NETTLE " or RSA-AES security types (RA2, RA2ne, RA2_256, RA2ne_256)" #endif , ""); bool PasswordValidator::validUser(const char* username) { std::vector users; users = split(plainUsers, ','); for (size_t i = 0; i < users.size(); i++) { if (users[i] == "*") return true; if (users[i] == username) return true; } return false; } SSecurityPlain::SSecurityPlain(SConnection* sc) : SSecurity(sc) { #ifdef WIN32 valid = new WinPasswdValidator(); #elif !defined(__APPLE__) valid = new UnixPasswordValidator(); #else valid = NULL; #endif state = 0; } bool SSecurityPlain::processMsg() { rdr::InStream* is = sc->getInStream(); char password[1024]; if (!valid) throw AuthFailureException("No password validator configured"); if (state == 0) { if (!is->hasData(8)) return false; ulen = is->readU32(); if (ulen >= sizeof(username)) throw AuthFailureException("Too long username"); plen = is->readU32(); if (plen >= sizeof(password)) throw AuthFailureException("Too long password"); state = 1; } if (state == 1) { if (!is->hasData(ulen + plen)) return false; state = 2; is->readBytes(username, ulen); is->readBytes(password, plen); password[plen] = 0; username[ulen] = 0; plen = 0; if (!valid->validate(sc, username, password)) throw AuthFailureException("invalid password or username"); } return true; }