2012-10-14 11:43:10 +04:00
|
|
|
/**
|
|
|
|
* FreeRDP: A Remote Desktop Protocol Implementation
|
|
|
|
* FreeRDP Client Common
|
|
|
|
*
|
|
|
|
* Copyright 2012 Marc-Andre Moreau <marcandre.moreau@gmail.com>
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
|
|
#include "config.h"
|
|
|
|
#endif
|
|
|
|
|
2015-12-17 18:43:55 +03:00
|
|
|
#include <string.h>
|
|
|
|
#include <errno.h>
|
|
|
|
|
2013-06-14 01:52:24 +04:00
|
|
|
#include <freerdp/client.h>
|
2013-06-14 00:18:19 +04:00
|
|
|
|
2013-09-20 00:25:10 +04:00
|
|
|
#include <freerdp/addin.h>
|
2014-06-30 17:40:24 +04:00
|
|
|
#include <freerdp/assistance.h>
|
2013-06-14 05:34:46 +04:00
|
|
|
#include <freerdp/client/file.h>
|
2015-12-17 18:43:55 +03:00
|
|
|
#include <freerdp/utils/passphrase.h>
|
2013-06-14 05:34:46 +04:00
|
|
|
#include <freerdp/client/cmdline.h>
|
2013-09-20 00:25:10 +04:00
|
|
|
#include <freerdp/client/channels.h>
|
2013-06-14 05:34:46 +04:00
|
|
|
|
2015-12-17 18:43:55 +03:00
|
|
|
#include <freerdp/log.h>
|
|
|
|
#define TAG CLIENT_TAG("common")
|
|
|
|
|
2016-02-01 17:09:51 +03:00
|
|
|
static BOOL freerdp_client_common_new(freerdp* instance, rdpContext* context)
|
2013-06-16 01:01:10 +04:00
|
|
|
{
|
2013-06-16 01:39:45 +04:00
|
|
|
RDP_CLIENT_ENTRY_POINTS* pEntryPoints = instance->pClientEntryPoints;
|
2017-09-25 14:29:23 +03:00
|
|
|
return IFCALLRESULT(TRUE, pEntryPoints->ClientNew, instance, context);
|
2013-06-16 01:01:10 +04:00
|
|
|
}
|
|
|
|
|
2016-02-01 17:09:51 +03:00
|
|
|
static void freerdp_client_common_free(freerdp* instance, rdpContext* context)
|
2013-06-16 01:01:10 +04:00
|
|
|
{
|
2013-06-16 01:39:45 +04:00
|
|
|
RDP_CLIENT_ENTRY_POINTS* pEntryPoints = instance->pClientEntryPoints;
|
2017-09-25 14:29:23 +03:00
|
|
|
IFCALL(pEntryPoints->ClientFree, instance, context);
|
2013-06-16 01:01:10 +04:00
|
|
|
}
|
|
|
|
|
2013-06-14 05:34:46 +04:00
|
|
|
/* Common API */
|
|
|
|
|
2013-06-14 06:11:23 +04:00
|
|
|
rdpContext* freerdp_client_context_new(RDP_CLIENT_ENTRY_POINTS* pEntryPoints)
|
|
|
|
{
|
|
|
|
freerdp* instance;
|
|
|
|
rdpContext* context;
|
|
|
|
|
2016-08-03 19:44:15 +03:00
|
|
|
if (!pEntryPoints)
|
|
|
|
return NULL;
|
2013-06-14 06:11:23 +04:00
|
|
|
|
2016-08-03 19:44:15 +03:00
|
|
|
IFCALL(pEntryPoints->GlobalInit);
|
2013-06-14 06:11:23 +04:00
|
|
|
instance = freerdp_new();
|
2015-05-06 23:32:45 +03:00
|
|
|
|
2015-03-23 19:25:23 +03:00
|
|
|
if (!instance)
|
|
|
|
return NULL;
|
|
|
|
|
2013-10-13 02:20:25 +04:00
|
|
|
instance->settings = pEntryPoints->settings;
|
2013-06-14 06:11:23 +04:00
|
|
|
instance->ContextSize = pEntryPoints->ContextSize;
|
2013-06-16 01:01:10 +04:00
|
|
|
instance->ContextNew = freerdp_client_common_new;
|
|
|
|
instance->ContextFree = freerdp_client_common_free;
|
2016-08-03 19:44:15 +03:00
|
|
|
instance->pClientEntryPoints = (RDP_CLIENT_ENTRY_POINTS*) malloc(
|
|
|
|
pEntryPoints->Size);
|
2015-05-06 23:32:45 +03:00
|
|
|
|
2015-03-23 19:25:23 +03:00
|
|
|
if (!instance->pClientEntryPoints)
|
|
|
|
goto out_fail;
|
|
|
|
|
2013-06-16 01:01:10 +04:00
|
|
|
CopyMemory(instance->pClientEntryPoints, pEntryPoints, pEntryPoints->Size);
|
2015-05-06 23:32:45 +03:00
|
|
|
|
2015-04-28 18:00:41 +03:00
|
|
|
if (!freerdp_context_new(instance))
|
2015-03-23 19:25:23 +03:00
|
|
|
goto out_fail2;
|
2013-06-14 06:11:23 +04:00
|
|
|
|
|
|
|
context = instance->context;
|
2013-07-11 19:53:15 +04:00
|
|
|
context->instance = instance;
|
|
|
|
context->settings = instance->settings;
|
2016-08-04 14:25:12 +03:00
|
|
|
|
|
|
|
if (freerdp_register_addin_provider(freerdp_channels_load_static_addin_entry,
|
|
|
|
0) != CHANNEL_RC_OK)
|
|
|
|
goto out_fail2;
|
|
|
|
|
2013-06-14 06:11:23 +04:00
|
|
|
return context;
|
2015-03-23 19:25:23 +03:00
|
|
|
out_fail2:
|
|
|
|
free(instance->pClientEntryPoints);
|
|
|
|
out_fail:
|
|
|
|
freerdp_free(instance);
|
|
|
|
return NULL;
|
2013-06-14 06:11:23 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
void freerdp_client_context_free(rdpContext* context)
|
|
|
|
{
|
2016-08-03 19:44:15 +03:00
|
|
|
freerdp* instance;
|
|
|
|
|
|
|
|
if (!context)
|
|
|
|
return;
|
|
|
|
|
|
|
|
instance = context->instance;
|
2013-11-01 05:12:06 +04:00
|
|
|
|
2013-10-23 01:05:41 +04:00
|
|
|
if (instance)
|
|
|
|
{
|
2016-08-04 14:25:12 +03:00
|
|
|
RDP_CLIENT_ENTRY_POINTS* pEntryPoints = instance->pClientEntryPoints;
|
2013-10-23 01:05:41 +04:00
|
|
|
freerdp_context_free(instance);
|
2016-08-04 14:25:12 +03:00
|
|
|
|
|
|
|
if (pEntryPoints)
|
|
|
|
IFCALL(pEntryPoints->GlobalUninit);
|
|
|
|
|
2013-10-23 01:05:41 +04:00
|
|
|
free(instance->pClientEntryPoints);
|
|
|
|
freerdp_free(instance);
|
|
|
|
}
|
2013-06-14 06:11:23 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
int freerdp_client_start(rdpContext* context)
|
|
|
|
{
|
2016-08-03 19:44:15 +03:00
|
|
|
RDP_CLIENT_ENTRY_POINTS* pEntryPoints;
|
|
|
|
|
|
|
|
if (!context || !context->instance || !context->instance->pClientEntryPoints)
|
|
|
|
return ERROR_BAD_ARGUMENTS;
|
|
|
|
|
|
|
|
pEntryPoints = context->instance->pClientEntryPoints;
|
2016-08-04 14:25:12 +03:00
|
|
|
return IFCALLRESULT(CHANNEL_RC_OK, pEntryPoints->ClientStart, context);
|
2013-06-14 06:11:23 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
int freerdp_client_stop(rdpContext* context)
|
|
|
|
{
|
2016-08-03 19:44:15 +03:00
|
|
|
RDP_CLIENT_ENTRY_POINTS* pEntryPoints;
|
|
|
|
|
|
|
|
if (!context || !context->instance || !context->instance->pClientEntryPoints)
|
|
|
|
return ERROR_BAD_ARGUMENTS;
|
|
|
|
|
|
|
|
pEntryPoints = context->instance->pClientEntryPoints;
|
2016-08-04 14:25:12 +03:00
|
|
|
return IFCALLRESULT(CHANNEL_RC_OK, pEntryPoints->ClientStop, context);
|
2013-06-14 06:11:23 +04:00
|
|
|
}
|
|
|
|
|
2013-06-14 23:07:17 +04:00
|
|
|
freerdp* freerdp_client_get_instance(rdpContext* context)
|
|
|
|
{
|
2016-08-03 19:44:15 +03:00
|
|
|
if (!context || !context->instance)
|
|
|
|
return NULL;
|
|
|
|
|
2013-06-14 23:07:17 +04:00
|
|
|
return context->instance;
|
|
|
|
}
|
|
|
|
|
|
|
|
HANDLE freerdp_client_get_thread(rdpContext* context)
|
|
|
|
{
|
2016-08-03 19:44:15 +03:00
|
|
|
if (!context)
|
|
|
|
return NULL;
|
|
|
|
|
2013-06-14 23:07:17 +04:00
|
|
|
return ((rdpClientContext*) context)->thread;
|
|
|
|
}
|
|
|
|
|
2014-07-28 19:52:40 +04:00
|
|
|
static BOOL freerdp_client_settings_post_process(rdpSettings* settings)
|
2014-07-26 23:23:39 +04:00
|
|
|
{
|
2014-07-28 19:52:40 +04:00
|
|
|
/* Moved GatewayUseSameCredentials logic outside of cmdline.c, so
|
2014-07-26 23:23:39 +04:00
|
|
|
* that the rdp file also triggers this functionality */
|
|
|
|
if (settings->GatewayEnabled)
|
|
|
|
{
|
|
|
|
if (settings->GatewayUseSameCredentials)
|
|
|
|
{
|
|
|
|
if (settings->Username)
|
2014-07-28 19:52:40 +04:00
|
|
|
{
|
2014-12-11 19:25:34 +03:00
|
|
|
free(settings->GatewayUsername);
|
2014-07-26 23:23:39 +04:00
|
|
|
settings->GatewayUsername = _strdup(settings->Username);
|
2014-12-11 19:25:34 +03:00
|
|
|
|
2014-07-28 19:52:40 +04:00
|
|
|
if (!settings->GatewayUsername)
|
2014-07-28 19:57:51 +04:00
|
|
|
goto out_error;
|
2014-07-28 19:52:40 +04:00
|
|
|
}
|
2016-08-03 19:44:15 +03:00
|
|
|
|
2014-07-26 23:23:39 +04:00
|
|
|
if (settings->Domain)
|
2014-07-28 19:52:40 +04:00
|
|
|
{
|
2014-12-11 19:25:34 +03:00
|
|
|
free(settings->GatewayDomain);
|
2014-07-26 23:23:39 +04:00
|
|
|
settings->GatewayDomain = _strdup(settings->Domain);
|
2014-12-11 19:25:34 +03:00
|
|
|
|
2014-07-28 19:52:40 +04:00
|
|
|
if (!settings->GatewayDomain)
|
2014-07-28 19:57:51 +04:00
|
|
|
goto out_error;
|
2014-07-28 19:52:40 +04:00
|
|
|
}
|
2016-08-03 19:44:15 +03:00
|
|
|
|
2014-07-26 23:23:39 +04:00
|
|
|
if (settings->Password)
|
2014-07-28 19:52:40 +04:00
|
|
|
{
|
2014-12-11 19:25:34 +03:00
|
|
|
free(settings->GatewayPassword);
|
2014-07-26 23:23:39 +04:00
|
|
|
settings->GatewayPassword = _strdup(settings->Password);
|
2014-12-11 19:25:34 +03:00
|
|
|
|
2014-07-28 19:52:40 +04:00
|
|
|
if (!settings->GatewayPassword)
|
2014-07-28 19:57:51 +04:00
|
|
|
goto out_error;
|
2014-07-28 19:52:40 +04:00
|
|
|
}
|
2014-07-26 23:23:39 +04:00
|
|
|
}
|
|
|
|
}
|
2016-02-01 17:09:51 +03:00
|
|
|
|
2014-07-28 23:24:48 +04:00
|
|
|
/* Moved logic for Multimon and Span monitors to force fullscreen, so
|
|
|
|
* that the rdp file also triggers this functionality */
|
|
|
|
if (settings->SpanMonitors)
|
|
|
|
{
|
|
|
|
settings->UseMultimon = TRUE;
|
|
|
|
settings->Fullscreen = TRUE;
|
|
|
|
}
|
|
|
|
else if (settings->UseMultimon)
|
|
|
|
{
|
|
|
|
settings->Fullscreen = TRUE;
|
|
|
|
}
|
2016-02-01 17:09:51 +03:00
|
|
|
|
2014-07-28 19:52:40 +04:00
|
|
|
return TRUE;
|
2014-07-28 19:57:51 +04:00
|
|
|
out_error:
|
|
|
|
free(settings->GatewayUsername);
|
|
|
|
free(settings->GatewayDomain);
|
|
|
|
free(settings->GatewayPassword);
|
|
|
|
return FALSE;
|
2014-07-26 23:23:39 +04:00
|
|
|
}
|
|
|
|
|
2014-07-28 19:52:40 +04:00
|
|
|
|
2015-03-16 12:15:37 +03:00
|
|
|
int freerdp_client_settings_parse_command_line(rdpSettings* settings, int argc,
|
2016-08-03 19:44:15 +03:00
|
|
|
char** argv, BOOL allowUnknown)
|
2013-06-14 05:34:46 +04:00
|
|
|
{
|
|
|
|
int status;
|
|
|
|
|
2013-10-13 05:07:12 +04:00
|
|
|
if (argc < 1)
|
2013-06-14 05:34:46 +04:00
|
|
|
return 0;
|
|
|
|
|
2013-10-13 05:07:12 +04:00
|
|
|
if (!argv)
|
2013-06-14 05:34:46 +04:00
|
|
|
return -1;
|
|
|
|
|
2016-08-03 19:44:15 +03:00
|
|
|
status = freerdp_client_settings_parse_command_line_arguments(settings, argc,
|
|
|
|
argv, allowUnknown);
|
2013-06-14 05:34:46 +04:00
|
|
|
|
2014-07-28 19:52:40 +04:00
|
|
|
if (status < 0)
|
|
|
|
return status;
|
|
|
|
|
2014-07-25 00:07:14 +04:00
|
|
|
/* This function will call logic that is applicable to the settings
|
|
|
|
* from command line parsing AND the rdp file parsing */
|
2015-05-06 23:32:45 +03:00
|
|
|
if (!freerdp_client_settings_post_process(settings))
|
2014-07-28 20:49:18 +04:00
|
|
|
status = -1;
|
2014-06-29 02:33:46 +04:00
|
|
|
|
2013-06-14 05:34:46 +04:00
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
2016-08-03 19:44:15 +03:00
|
|
|
int freerdp_client_settings_parse_connection_file(rdpSettings* settings,
|
|
|
|
const char* filename)
|
2013-06-14 05:34:46 +04:00
|
|
|
{
|
|
|
|
rdpFile* file;
|
2015-06-17 23:08:02 +03:00
|
|
|
int ret = -1;
|
2013-06-14 05:34:46 +04:00
|
|
|
file = freerdp_client_rdp_file_new();
|
2016-08-03 19:44:15 +03:00
|
|
|
|
2015-06-17 23:08:02 +03:00
|
|
|
if (!file)
|
|
|
|
return -1;
|
2016-08-03 19:44:15 +03:00
|
|
|
|
2015-06-17 23:08:02 +03:00
|
|
|
if (!freerdp_client_parse_rdp_file(file, filename))
|
|
|
|
goto out;
|
2016-08-03 19:44:15 +03:00
|
|
|
|
2015-06-17 23:08:02 +03:00
|
|
|
if (!freerdp_client_populate_settings_from_rdp_file(file, settings))
|
|
|
|
goto out;
|
2013-06-14 05:34:46 +04:00
|
|
|
|
2015-06-17 23:08:02 +03:00
|
|
|
ret = 0;
|
|
|
|
out:
|
|
|
|
freerdp_client_rdp_file_free(file);
|
|
|
|
return ret;
|
2013-06-14 05:34:46 +04:00
|
|
|
}
|
|
|
|
|
2016-08-03 19:44:15 +03:00
|
|
|
int freerdp_client_settings_parse_connection_file_buffer(rdpSettings* settings,
|
|
|
|
const BYTE* buffer, size_t size)
|
2013-06-14 05:34:46 +04:00
|
|
|
{
|
|
|
|
rdpFile* file;
|
2013-09-18 01:03:35 +04:00
|
|
|
int status = -1;
|
2013-06-14 05:34:46 +04:00
|
|
|
file = freerdp_client_rdp_file_new();
|
2016-08-03 19:44:15 +03:00
|
|
|
|
2015-06-17 23:08:02 +03:00
|
|
|
if (!file)
|
|
|
|
return -1;
|
2013-09-18 01:03:35 +04:00
|
|
|
|
|
|
|
if (freerdp_client_parse_rdp_file_buffer(file, buffer, size)
|
2016-08-03 19:44:15 +03:00
|
|
|
&& freerdp_client_populate_settings_from_rdp_file(file, settings))
|
2013-09-18 01:03:35 +04:00
|
|
|
{
|
|
|
|
status = 0;
|
|
|
|
}
|
2013-07-06 07:20:56 +04:00
|
|
|
|
2013-06-14 05:34:46 +04:00
|
|
|
freerdp_client_rdp_file_free(file);
|
2013-09-18 01:03:35 +04:00
|
|
|
return status;
|
2013-07-06 07:20:56 +04:00
|
|
|
}
|
|
|
|
|
2016-08-03 19:44:15 +03:00
|
|
|
int freerdp_client_settings_write_connection_file(const rdpSettings* settings,
|
|
|
|
const char* filename, BOOL unicode)
|
2013-07-06 07:20:56 +04:00
|
|
|
{
|
2013-09-18 01:03:35 +04:00
|
|
|
rdpFile* file;
|
2015-06-17 23:08:02 +03:00
|
|
|
int ret = -1;
|
2013-09-18 01:03:35 +04:00
|
|
|
file = freerdp_client_rdp_file_new();
|
2016-08-03 19:44:15 +03:00
|
|
|
|
2015-06-17 23:08:02 +03:00
|
|
|
if (!file)
|
|
|
|
return -1;
|
2013-07-06 07:20:56 +04:00
|
|
|
|
2013-12-05 03:25:55 +04:00
|
|
|
if (!freerdp_client_populate_rdp_file_from_settings(file, settings))
|
2015-06-17 23:08:02 +03:00
|
|
|
goto out;
|
2013-12-05 03:25:55 +04:00
|
|
|
|
|
|
|
if (!freerdp_client_write_rdp_file(file, filename, unicode))
|
2015-06-17 23:08:02 +03:00
|
|
|
goto out;
|
2013-12-05 03:25:55 +04:00
|
|
|
|
2015-06-17 23:08:02 +03:00
|
|
|
ret = 0;
|
|
|
|
out:
|
2013-09-18 01:03:35 +04:00
|
|
|
freerdp_client_rdp_file_free(file);
|
2015-06-17 23:08:02 +03:00
|
|
|
return ret;
|
2013-06-14 05:34:46 +04:00
|
|
|
}
|
2014-06-29 02:33:46 +04:00
|
|
|
|
2016-08-03 19:44:15 +03:00
|
|
|
int freerdp_client_settings_parse_assistance_file(rdpSettings* settings,
|
2018-11-08 11:27:57 +03:00
|
|
|
int argc, char* argv[])
|
2014-06-29 02:33:46 +04:00
|
|
|
{
|
2018-11-08 11:27:57 +03:00
|
|
|
int status, x;
|
2018-08-17 15:40:12 +03:00
|
|
|
int ret = -1;
|
2018-11-08 11:27:57 +03:00
|
|
|
char* filename;
|
|
|
|
char* password = NULL;
|
2014-06-29 02:33:46 +04:00
|
|
|
rdpAssistanceFile* file;
|
2018-11-08 11:27:57 +03:00
|
|
|
|
2018-11-22 13:19:12 +03:00
|
|
|
if (!settings || !argv || (argc < 2))
|
2018-11-08 11:27:57 +03:00
|
|
|
return -1;
|
|
|
|
|
|
|
|
filename = argv[1];
|
|
|
|
|
|
|
|
for (x = 2; x < argc; x++)
|
|
|
|
{
|
|
|
|
const char* key = strstr(argv[x], "assistance:");
|
|
|
|
|
|
|
|
if (key)
|
|
|
|
password = strchr(key, ':') + 1;
|
|
|
|
}
|
|
|
|
|
2014-06-30 20:51:27 +04:00
|
|
|
file = freerdp_assistance_file_new();
|
2014-06-29 02:33:46 +04:00
|
|
|
|
|
|
|
if (!file)
|
|
|
|
return -1;
|
|
|
|
|
2018-11-08 11:27:57 +03:00
|
|
|
status = freerdp_assistance_parse_file(file, filename, password);
|
2014-06-29 02:33:46 +04:00
|
|
|
|
|
|
|
if (status < 0)
|
2018-08-17 15:40:12 +03:00
|
|
|
goto out;
|
2014-06-29 02:33:46 +04:00
|
|
|
|
2018-11-12 15:40:40 +03:00
|
|
|
if (!freerdp_assistance_populate_settings_from_assistance_file(file, settings))
|
2018-08-17 15:40:12 +03:00
|
|
|
goto out;
|
2014-06-29 02:33:46 +04:00
|
|
|
|
2018-08-17 15:40:12 +03:00
|
|
|
ret = 0;
|
|
|
|
out:
|
2014-06-30 20:51:27 +04:00
|
|
|
freerdp_assistance_file_free(file);
|
2018-08-17 15:40:12 +03:00
|
|
|
return ret;
|
2014-06-29 02:33:46 +04:00
|
|
|
}
|
2014-07-29 00:58:32 +04:00
|
|
|
|
2015-12-17 18:43:55 +03:00
|
|
|
/** Callback set in the rdp_freerdp structure, and used to get the user's password,
|
|
|
|
* if required to establish the connection.
|
|
|
|
* This function is actually called in credssp_ntlmssp_client_init()
|
|
|
|
* @see rdp_server_accept_nego() and rdp_check_fds()
|
|
|
|
* @param instance - pointer to the rdp_freerdp structure that contains the connection settings
|
|
|
|
* @param username - unused
|
|
|
|
* @param password - on return: pointer to a character string that will be filled by the password entered by the user.
|
|
|
|
* Note that this character string will be allocated inside the function, and needs to be deallocated by the caller
|
|
|
|
* using free(), even in case this function fails.
|
|
|
|
* @param domain - unused
|
|
|
|
* @return TRUE if a password was successfully entered. See freerdp_passphrase_read() for more details.
|
|
|
|
*/
|
2016-08-03 19:44:15 +03:00
|
|
|
static BOOL client_cli_authenticate_raw(freerdp* instance, BOOL gateway,
|
|
|
|
char** username,
|
|
|
|
char** password, char** domain)
|
2015-12-17 18:43:55 +03:00
|
|
|
{
|
|
|
|
static const size_t password_size = 512;
|
|
|
|
const char* auth[] =
|
|
|
|
{
|
|
|
|
"Username: ",
|
|
|
|
"Domain: ",
|
|
|
|
"Password: "
|
|
|
|
};
|
|
|
|
const char* gw[] =
|
|
|
|
{
|
|
|
|
"GatewayUsername: ",
|
|
|
|
"GatewayDomain: ",
|
|
|
|
"GatewayPassword: "
|
|
|
|
};
|
|
|
|
const char** prompt = (gateway) ? gw : auth;
|
|
|
|
|
|
|
|
if (!username || !password || !domain)
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
if (!*username)
|
|
|
|
{
|
|
|
|
size_t username_size = 0;
|
|
|
|
printf("%s", prompt[0]);
|
2016-08-03 19:44:15 +03:00
|
|
|
|
2015-12-18 11:45:44 +03:00
|
|
|
if (GetLine(username, &username_size, stdin) < 0)
|
2015-12-17 18:43:55 +03:00
|
|
|
{
|
2015-12-18 11:45:44 +03:00
|
|
|
WLog_ERR(TAG, "GetLine returned %s [%d]", strerror(errno), errno);
|
2015-12-17 18:43:55 +03:00
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (*username)
|
|
|
|
{
|
|
|
|
*username = StrSep(username, "\r");
|
|
|
|
*username = StrSep(username, "\n");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!*domain)
|
|
|
|
{
|
|
|
|
size_t domain_size = 0;
|
|
|
|
printf("%s", prompt[1]);
|
2016-08-03 19:44:15 +03:00
|
|
|
|
2015-12-18 11:45:44 +03:00
|
|
|
if (GetLine(domain, &domain_size, stdin) < 0)
|
2015-12-17 18:43:55 +03:00
|
|
|
{
|
2015-12-18 11:45:44 +03:00
|
|
|
WLog_ERR(TAG, "GetLine returned %s [%d]", strerror(errno), errno);
|
2015-12-17 18:43:55 +03:00
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (*domain)
|
|
|
|
{
|
|
|
|
*domain = StrSep(domain, "\r");
|
|
|
|
*domain = StrSep(domain, "\n");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!*password)
|
|
|
|
{
|
|
|
|
*password = calloc(password_size, sizeof(char));
|
2016-08-03 19:44:15 +03:00
|
|
|
|
2015-12-17 18:43:55 +03:00
|
|
|
if (!*password)
|
|
|
|
goto fail;
|
|
|
|
|
|
|
|
if (freerdp_passphrase_read(prompt[2], *password, password_size,
|
2016-08-03 19:44:15 +03:00
|
|
|
instance->settings->CredentialsFromStdin) == NULL)
|
2015-12-17 18:43:55 +03:00
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
|
|
|
|
return TRUE;
|
|
|
|
fail:
|
|
|
|
free(*username);
|
|
|
|
free(*domain);
|
|
|
|
free(*password);
|
|
|
|
*username = NULL;
|
|
|
|
*domain = NULL;
|
|
|
|
*password = NULL;
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
2016-08-03 19:44:15 +03:00
|
|
|
BOOL client_cli_authenticate(freerdp* instance, char** username,
|
|
|
|
char** password, char** domain)
|
2015-12-17 18:43:55 +03:00
|
|
|
{
|
2018-09-04 16:49:21 +03:00
|
|
|
if (instance->settings->SmartcardLogon)
|
|
|
|
{
|
|
|
|
WLog_INFO(TAG, "Authentication via smartcard");
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2015-12-17 18:43:55 +03:00
|
|
|
return client_cli_authenticate_raw(instance, FALSE, username, password, domain);
|
|
|
|
}
|
|
|
|
|
2016-08-03 19:44:15 +03:00
|
|
|
BOOL client_cli_gw_authenticate(freerdp* instance, char** username,
|
|
|
|
char** password, char** domain)
|
2015-12-17 18:43:55 +03:00
|
|
|
{
|
|
|
|
return client_cli_authenticate_raw(instance, TRUE, username, password, domain);
|
|
|
|
}
|
|
|
|
|
|
|
|
static DWORD client_cli_accept_certificate(rdpSettings* settings)
|
|
|
|
{
|
|
|
|
char answer;
|
|
|
|
|
2016-02-19 12:22:38 +03:00
|
|
|
if (settings->CredentialsFromStdin)
|
|
|
|
return 0;
|
|
|
|
|
2015-12-17 18:43:55 +03:00
|
|
|
while (1)
|
|
|
|
{
|
|
|
|
printf("Do you trust the above certificate? (Y/T/N) ");
|
2017-01-31 23:33:44 +03:00
|
|
|
fflush(stdout);
|
2015-12-17 18:43:55 +03:00
|
|
|
answer = fgetc(stdin);
|
|
|
|
|
|
|
|
if (feof(stdin))
|
|
|
|
{
|
|
|
|
printf("\nError: Could not read answer from stdin.");
|
2016-08-03 19:44:15 +03:00
|
|
|
|
2015-12-17 18:43:55 +03:00
|
|
|
if (settings->CredentialsFromStdin)
|
|
|
|
printf(" - Run without parameter \"--from-stdin\" to set trust.");
|
2016-08-03 19:44:15 +03:00
|
|
|
|
2015-12-17 18:43:55 +03:00
|
|
|
printf("\n");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2016-08-03 19:44:15 +03:00
|
|
|
switch (answer)
|
2015-12-17 18:43:55 +03:00
|
|
|
{
|
|
|
|
case 'y':
|
|
|
|
case 'Y':
|
|
|
|
return 1;
|
2016-08-03 19:44:15 +03:00
|
|
|
|
2015-12-17 18:43:55 +03:00
|
|
|
case 't':
|
|
|
|
case 'T':
|
|
|
|
return 2;
|
2016-08-03 19:44:15 +03:00
|
|
|
|
2015-12-17 18:43:55 +03:00
|
|
|
case 'n':
|
|
|
|
case 'N':
|
|
|
|
return 0;
|
2016-08-03 19:44:15 +03:00
|
|
|
|
2015-12-17 18:43:55 +03:00
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
2016-08-03 19:44:15 +03:00
|
|
|
|
2015-12-17 18:43:55 +03:00
|
|
|
printf("\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/** Callback set in the rdp_freerdp structure, and used to make a certificate validation
|
|
|
|
* when the connection requires it.
|
|
|
|
* This function will actually be called by tls_verify_certificate().
|
|
|
|
* @see rdp_client_connect() and tls_connect()
|
2018-11-30 13:04:20 +03:00
|
|
|
* @deprecated Use client_cli_verify_certificate_ex
|
2015-12-17 18:43:55 +03:00
|
|
|
* @param instance - pointer to the rdp_freerdp structure that contains the connection settings
|
|
|
|
* @param common_name
|
|
|
|
* @param subject
|
|
|
|
* @param issuer
|
|
|
|
* @param fingerprint
|
|
|
|
* @param host_mismatch Indicates the certificate host does not match.
|
|
|
|
* @return 1 if the certificate is trusted, 2 if temporary trusted, 0 otherwise.
|
|
|
|
*/
|
|
|
|
DWORD client_cli_verify_certificate(freerdp* instance, const char* common_name,
|
2016-08-03 19:44:15 +03:00
|
|
|
const char* subject, const char* issuer,
|
|
|
|
const char* fingerprint, BOOL host_mismatch)
|
2015-12-17 18:43:55 +03:00
|
|
|
{
|
2019-02-07 19:53:21 +03:00
|
|
|
WINPR_UNUSED(common_name);
|
|
|
|
WINPR_UNUSED(host_mismatch);
|
|
|
|
|
2018-11-30 13:04:20 +03:00
|
|
|
printf("WARNING: This callback is deprecated, migrate to client_cli_verify_certificate_ex\n");
|
2015-12-17 18:43:55 +03:00
|
|
|
printf("Certificate details:\n");
|
|
|
|
printf("\tSubject: %s\n", subject);
|
|
|
|
printf("\tIssuer: %s\n", issuer);
|
|
|
|
printf("\tThumbprint: %s\n", fingerprint);
|
|
|
|
printf("The above X.509 certificate could not be verified, possibly because you do not have\n"
|
2016-08-03 19:44:15 +03:00
|
|
|
"the CA certificate in your certificate store, or the certificate has expired.\n"
|
2017-11-21 13:47:33 +03:00
|
|
|
"Please look at the OpenSSL documentation on how to add a private CA to the store.\n");
|
2015-12-17 18:43:55 +03:00
|
|
|
return client_cli_accept_certificate(instance->settings);
|
|
|
|
}
|
|
|
|
|
2018-11-30 13:04:20 +03:00
|
|
|
/** Callback set in the rdp_freerdp structure, and used to make a certificate validation
|
|
|
|
* when the connection requires it.
|
|
|
|
* This function will actually be called by tls_verify_certificate().
|
|
|
|
* @see rdp_client_connect() and tls_connect()
|
|
|
|
* @param instance pointer to the rdp_freerdp structure that contains the connection settings
|
|
|
|
* @param host The host currently connecting to
|
|
|
|
* @param port The port currently connecting to
|
|
|
|
* @param common_name The common name of the certificate, should match host or an alias of it
|
|
|
|
* @param subject The subject of the certificate
|
|
|
|
* @param issuer The certificate issuer name
|
|
|
|
* @param fingerprint The fingerprint of the certificate
|
|
|
|
* @param flags See VERIFY_CERT_FLAG_* for possible values.
|
|
|
|
*
|
|
|
|
* @return 1 if the certificate is trusted, 2 if temporary trusted, 0 otherwise.
|
|
|
|
*/
|
|
|
|
DWORD client_cli_verify_certificate_ex(freerdp* instance, const char* host, UINT16 port,
|
|
|
|
const char* common_name,
|
|
|
|
const char* subject, const char* issuer,
|
|
|
|
const char* fingerprint, DWORD flags)
|
|
|
|
{
|
|
|
|
const char* type = "RDP-Server";
|
|
|
|
|
|
|
|
if (flags & VERIFY_CERT_FLAG_GATEWAY)
|
|
|
|
type = "RDP-Gateway";
|
|
|
|
|
|
|
|
if (flags & VERIFY_CERT_FLAG_REDIRECT)
|
|
|
|
type = "RDP-Redirect";
|
|
|
|
|
|
|
|
printf("Certificate details for %s:%"PRIu16" (%s):\n", host, port, type);
|
|
|
|
printf("\tCommon Name: %s\n", common_name);
|
|
|
|
printf("\tSubject: %s\n", subject);
|
|
|
|
printf("\tIssuer: %s\n", issuer);
|
|
|
|
printf("\tThumbprint: %s\n", fingerprint);
|
|
|
|
printf("The above X.509 certificate could not be verified, possibly because you do not have\n"
|
|
|
|
"the CA certificate in your certificate store, or the certificate has expired.\n"
|
|
|
|
"Please look at the OpenSSL documentation on how to add a private CA to the store.\n");
|
|
|
|
return client_cli_accept_certificate(instance->settings);
|
|
|
|
}
|
|
|
|
|
2015-12-17 18:43:55 +03:00
|
|
|
/** Callback set in the rdp_freerdp structure, and used to make a certificate validation
|
|
|
|
* when a stored certificate does not match the remote counterpart.
|
|
|
|
* This function will actually be called by tls_verify_certificate().
|
|
|
|
* @see rdp_client_connect() and tls_connect()
|
2018-11-30 13:04:20 +03:00
|
|
|
* @deprecated Use client_cli_verify_changed_certificate_ex
|
2015-12-17 18:43:55 +03:00
|
|
|
* @param instance - pointer to the rdp_freerdp structure that contains the connection settings
|
|
|
|
* @param common_name
|
|
|
|
* @param subject
|
|
|
|
* @param issuer
|
|
|
|
* @param fingerprint
|
|
|
|
* @param old_subject
|
|
|
|
* @param old_issuer
|
|
|
|
* @param old_fingerprint
|
|
|
|
* @return 1 if the certificate is trusted, 2 if temporary trusted, 0 otherwise.
|
|
|
|
*/
|
2016-08-03 19:44:15 +03:00
|
|
|
DWORD client_cli_verify_changed_certificate(freerdp* instance,
|
|
|
|
const char* common_name,
|
|
|
|
const char* subject, const char* issuer,
|
|
|
|
const char* fingerprint,
|
|
|
|
const char* old_subject, const char* old_issuer,
|
|
|
|
const char* old_fingerprint)
|
2015-12-17 18:43:55 +03:00
|
|
|
{
|
2019-02-07 19:53:21 +03:00
|
|
|
WINPR_UNUSED(common_name);
|
|
|
|
|
2018-11-30 13:04:20 +03:00
|
|
|
printf("WARNING: This callback is deprecated, migrate to client_cli_verify_changed_certificate_ex\n");
|
2015-12-17 18:43:55 +03:00
|
|
|
printf("!!! Certificate has changed !!!\n");
|
|
|
|
printf("\n");
|
|
|
|
printf("New Certificate details:\n");
|
|
|
|
printf("\tSubject: %s\n", subject);
|
|
|
|
printf("\tIssuer: %s\n", issuer);
|
|
|
|
printf("\tThumbprint: %s\n", fingerprint);
|
|
|
|
printf("\n");
|
|
|
|
printf("Old Certificate details:\n");
|
|
|
|
printf("\tSubject: %s\n", old_subject);
|
|
|
|
printf("\tIssuer: %s\n", old_issuer);
|
|
|
|
printf("\tThumbprint: %s\n", old_fingerprint);
|
|
|
|
printf("\n");
|
|
|
|
printf("The above X.509 certificate does not match the certificate used for previous connections.\n"
|
2016-08-03 19:44:15 +03:00
|
|
|
"This may indicate that the certificate has been tampered with.\n"
|
|
|
|
"Please contact the administrator of the RDP server and clarify.\n");
|
2015-12-17 18:43:55 +03:00
|
|
|
return client_cli_accept_certificate(instance->settings);
|
|
|
|
}
|
|
|
|
|
2018-11-30 13:04:20 +03:00
|
|
|
/** Callback set in the rdp_freerdp structure, and used to make a certificate validation
|
|
|
|
* when a stored certificate does not match the remote counterpart.
|
|
|
|
* This function will actually be called by tls_verify_certificate().
|
|
|
|
* @see rdp_client_connect() and tls_connect()
|
|
|
|
* @param instance pointer to the rdp_freerdp structure that contains the connection settings
|
|
|
|
* @param host The host currently connecting to
|
|
|
|
* @param port The port currently connecting to
|
|
|
|
* @param common_name The common name of the certificate, should match host or an alias of it
|
|
|
|
* @param subject The subject of the certificate
|
|
|
|
* @param issuer The certificate issuer name
|
|
|
|
* @param fingerprint The fingerprint of the certificate
|
|
|
|
* @param old_subject The subject of the previous certificate
|
|
|
|
* @param old_issuer The previous certificate issuer name
|
|
|
|
* @param old_fingerprint The fingerprint of the previous certificate
|
|
|
|
* @param flags See VERIFY_CERT_FLAG_* for possible values.
|
|
|
|
*
|
|
|
|
* @return 1 if the certificate is trusted, 2 if temporary trusted, 0 otherwise.
|
|
|
|
*/
|
|
|
|
DWORD client_cli_verify_changed_certificate_ex(freerdp* instance,
|
|
|
|
const char* host, UINT16 port,
|
|
|
|
const char* common_name,
|
|
|
|
const char* subject, const char* issuer,
|
|
|
|
const char* fingerprint,
|
|
|
|
const char* old_subject, const char* old_issuer,
|
|
|
|
const char* old_fingerprint, DWORD flags)
|
|
|
|
{
|
|
|
|
const char* type = "RDP-Server";
|
|
|
|
|
|
|
|
if (flags & VERIFY_CERT_FLAG_GATEWAY)
|
|
|
|
type = "RDP-Gateway";
|
|
|
|
|
|
|
|
if (flags & VERIFY_CERT_FLAG_REDIRECT)
|
|
|
|
type = "RDP-Redirect";
|
|
|
|
|
|
|
|
printf("!!!Certificate for %s:%"PRIu16" (%s) has changed!!!\n", host, port, type);
|
|
|
|
printf("\n");
|
|
|
|
printf("New Certificate details:\n");
|
|
|
|
printf("\tCommon Name: %s\n", common_name);
|
|
|
|
printf("\tSubject: %s\n", subject);
|
|
|
|
printf("\tIssuer: %s\n", issuer);
|
|
|
|
printf("\tThumbprint: %s\n", fingerprint);
|
|
|
|
printf("\n");
|
|
|
|
printf("Old Certificate details:\n");
|
|
|
|
printf("\tSubject: %s\n", old_subject);
|
|
|
|
printf("\tIssuer: %s\n", old_issuer);
|
|
|
|
printf("\tThumbprint: %s\n", old_fingerprint);
|
|
|
|
printf("\n");
|
|
|
|
printf("The above X.509 certificate does not match the certificate used for previous connections.\n"
|
|
|
|
"This may indicate that the certificate has been tampered with.\n"
|
|
|
|
"Please contact the administrator of the RDP server and clarify.\n");
|
|
|
|
return client_cli_accept_certificate(instance->settings);
|
|
|
|
}
|
|
|
|
|
2018-09-24 11:30:59 +03:00
|
|
|
BOOL client_auto_reconnect(freerdp* instance)
|
2018-09-24 17:24:32 +03:00
|
|
|
{
|
|
|
|
return client_auto_reconnect_ex(instance, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
BOOL client_auto_reconnect_ex(freerdp* instance, BOOL(*window_events)(freerdp* instance))
|
2018-09-24 11:30:59 +03:00
|
|
|
{
|
|
|
|
UINT32 maxRetries;
|
|
|
|
UINT32 numRetries = 0;
|
|
|
|
rdpSettings* settings;
|
|
|
|
|
|
|
|
if (!instance || !instance->settings)
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
settings = instance->settings;
|
|
|
|
maxRetries = settings->AutoReconnectMaxRetries;
|
|
|
|
|
|
|
|
/* Only auto reconnect on network disconnects. */
|
|
|
|
if (freerdp_error_info(instance) != 0)
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
/* A network disconnect was detected */
|
|
|
|
WLog_INFO(TAG, "Network disconnect!");
|
|
|
|
|
|
|
|
if (!settings->AutoReconnectionEnabled)
|
|
|
|
{
|
|
|
|
/* No auto-reconnect - just quit */
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Perform an auto-reconnect. */
|
|
|
|
while (TRUE)
|
|
|
|
{
|
2018-09-24 17:24:32 +03:00
|
|
|
UINT32 x;
|
|
|
|
|
2018-09-24 11:30:59 +03:00
|
|
|
/* Quit retrying if max retries has been exceeded */
|
|
|
|
if ((maxRetries > 0) && (numRetries++ >= maxRetries))
|
|
|
|
{
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Attempt the next reconnect */
|
|
|
|
WLog_INFO(TAG, "Attempting reconnect (%"PRIu32" of %"PRIu32")", numRetries, maxRetries);
|
|
|
|
|
|
|
|
if (freerdp_reconnect(instance))
|
|
|
|
return TRUE;
|
|
|
|
|
2018-09-24 17:24:32 +03:00
|
|
|
for (x = 0; x < 50; x++)
|
|
|
|
{
|
|
|
|
if (!IFCALLRESULT(TRUE, window_events, instance))
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
Sleep(100);
|
|
|
|
}
|
2018-09-24 11:30:59 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
WLog_ERR(TAG, "Maximum reconnect retries exceeded");
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
2015-12-17 18:43:55 +03:00
|
|
|
|