228 lines
5.6 KiB
C
228 lines
5.6 KiB
C
|
|
#ifndef LIBSCP_V1S_C
|
|
#define LIBSCP_V1S_C
|
|
|
|
#include "libscp_v1s.h"
|
|
|
|
/* server API */
|
|
enum SCP_SERVER_STATES_E scp_v1s_accept(struct SCP_CONNECTION* c, struct SCP_SESSION** s, int skipVchk)
|
|
{
|
|
struct SCP_SESSION* session;
|
|
uint32_t version;
|
|
uint32_t size;
|
|
uint16_t cmdset;
|
|
uint16_t cmd;
|
|
unsigned char sz;
|
|
|
|
if (!skipVchk)
|
|
{
|
|
|
|
if (0==tcp_force_recv(c->in_sck, c->in_s->data, 8))
|
|
{
|
|
in_uint32_be(c->in_s, version);
|
|
if (version != 1)
|
|
{
|
|
return SCP_SERVER_STATE_VERSION_ERR;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
return SCP_SERVER_STATE_NETWORK_ERR;
|
|
}
|
|
}
|
|
|
|
in_uint32_be(c->in_s, size);
|
|
if (size<12)
|
|
{
|
|
return SCP_SERVER_STATE_SIZE_ERR;
|
|
}
|
|
|
|
if (0!=tcp_force_recv(c->in_sck, c->in_s->data, (size-8)))
|
|
{
|
|
return SCP_SERVER_STATE_NETWORK_ERR;
|
|
}
|
|
|
|
/* reading command set */
|
|
in_uint16_be(c->in_s, cmdset);
|
|
|
|
/* if we are starting a management session */
|
|
if (cmdset==SCP_COMMAND_SET_MANAGE)
|
|
{
|
|
return SCP_SERVER_STATE_START_MANAGE;
|
|
}
|
|
|
|
/* if we started with resource sharing... */
|
|
if (cmdset==SCP_COMMAND_SET_RSR)
|
|
{
|
|
return SCP_SERVER_STATE_SEQUENCE_ERR;
|
|
}
|
|
|
|
/* reading command */
|
|
in_uint16_be(c->in_s, cmd);
|
|
if (cmd != 0)
|
|
{
|
|
return SCP_SERVER_STATE_SEQUENCE_ERR;
|
|
}
|
|
|
|
session = g_malloc(sizeof(struct SCP_SESSION),1);
|
|
if (0 == session) return SCP_SERVER_STATE_INTERNAL_ERR;
|
|
|
|
in_uint8(c->in_s, session->type);
|
|
if ((session->type != SCP_SESSION_TYPE_XVNC) && (session->type != SCP_SESSION_TYPE_XRDP))
|
|
{
|
|
return SCP_SERVER_STATE_SESSION_TYPE_ERR;
|
|
}
|
|
in_uint16_be(c->in_s,session->height);
|
|
in_uint16_be(c->in_s, session->width);
|
|
in_uint8(c->in_s, session->bpp);
|
|
in_uint8(c->in_s, session->rsr);
|
|
in_uint8a(c->in_s, session->locale, 17);
|
|
session->locale[17]='\0';
|
|
|
|
in_uint8(c->in_s, session->addr_type);
|
|
if (session->addr_type==SCP_ADDRESS_TYPE_IPV4)
|
|
{
|
|
in_uint32_be(c->in_s, session->ipv4addr);
|
|
}
|
|
else if (session->addr_type==SCP_ADDRESS_TYPE_IPV6)
|
|
{
|
|
#warning how to handle ipv6 addresses?
|
|
}
|
|
|
|
/* reading hostname */
|
|
in_uint8(c->in_s, sz);
|
|
session->hostname=g_malloc(sz+1,1);
|
|
if (0==session->hostname) return SCP_SERVER_STATE_INTERNAL_ERR;
|
|
session->hostname[sz]='\0';
|
|
in_uint8a(c->in_s, session->hostname, sz);
|
|
|
|
/* reading username */
|
|
in_uint8(c->in_s, sz);
|
|
session->username=g_malloc(sz+1,1);
|
|
if (0==session->username) return SCP_SERVER_STATE_INTERNAL_ERR;
|
|
session->username[sz]='\0';
|
|
in_uint8a(c->in_s, session->username, sz);
|
|
|
|
/* reading password */
|
|
in_uint8(c->in_s, sz);
|
|
session->password=g_malloc(sz+1,1);
|
|
if (0==session->password) return SCP_SERVER_STATE_INTERNAL_ERR;
|
|
session->password[sz]='\0';
|
|
in_uint8a(c->in_s, session->password, sz);
|
|
|
|
//leggo lo stream e ritorno la struttura
|
|
*s=session;
|
|
|
|
return SCP_SERVER_STATE_OK;
|
|
}
|
|
|
|
enum SCP_SERVER_STATES_E scp_v1s_deny_connection(struct SCP_CONNECTION* c, char* reason)
|
|
{
|
|
int rlen;
|
|
|
|
/* forcing message not to exceed 64k */
|
|
rlen = g_strlen(reason);
|
|
if (rlen > 65535)
|
|
{
|
|
rlen = 65535;
|
|
}
|
|
|
|
out_uint32_be(c->out_s, 1);
|
|
/* packet size: 4 + 4 + 2 + 2 + 2 + strlen(reason)*/
|
|
/* version + size + cmdset + cmd + msglen + msg */
|
|
out_uint32_be(c->out_s, rlen+14);
|
|
out_uint16_be(c->out_s, SCP_COMMAND_SET_DEFAULT);
|
|
out_uint16_be(c->out_s, 2);
|
|
out_uint16_be(c->out_s, rlen)
|
|
out_uint8p(c->out_s, reason, rlen);
|
|
|
|
if (0!=tcp_force_send(c->in_sck, c->out_s->data, rlen+14))
|
|
{
|
|
return SCP_SERVER_STATE_NETWORK_ERR;
|
|
}
|
|
|
|
return SCP_SERVER_STATE_END;
|
|
}
|
|
|
|
enum SCP_SERVER_STATES_E scp_v1s_request_password(struct SCP_CONNECTION* c, char** pwd, char** user)
|
|
{
|
|
unsigned char sz;
|
|
uint32_t version;
|
|
uint32_t size;
|
|
uint16_t cmdset;
|
|
uint16_t cmd;
|
|
|
|
version=1;
|
|
size=12;
|
|
cmdset=0;
|
|
cmd=3;
|
|
|
|
/* send password request */
|
|
out_uint32_be(c->out_s, 1); /* version */
|
|
out_uint32_be(c->out_s, 12); /* size */
|
|
out_uint16_be(c->out_s, SCP_COMMAND_SET_DEFAULT); /* cmdset */
|
|
out_uint16_be(c->out_s, 3); /* cmd */
|
|
|
|
if (0!=tcp_force_send(c->in_sck, c->out_s->data, 12))
|
|
{
|
|
return SCP_SERVER_STATE_NETWORK_ERR;
|
|
}
|
|
|
|
/* receive password & username */
|
|
#warning check cmd seq
|
|
/* tcp_force_recv()
|
|
in_uint32_be()
|
|
in_uint32_be
|
|
in_uint16_be
|
|
in_uint16_be*/
|
|
|
|
/* reading username */
|
|
in_uint8(c->in_s, sz);
|
|
(*user)=g_malloc(sz+1,1);
|
|
if (0==(*user)) return SCP_SERVER_STATE_INTERNAL_ERR;
|
|
(*user)[sz]='\0';
|
|
in_uint8a(c->in_s, (*user), sz);
|
|
|
|
/* reading password */
|
|
in_uint8(c->in_s, sz);
|
|
(*pwd)=g_malloc(sz+1,1);
|
|
if (0==(*pwd)) return SCP_SERVER_STATE_INTERNAL_ERR;
|
|
(*pwd)[sz]='\0';
|
|
in_uint8a(c->in_s, (*pwd), sz);
|
|
|
|
return SCP_SERVER_STATE_INTERNAL_ERR;
|
|
}
|
|
|
|
/* 020 */
|
|
enum SCP_SERVER_STATES_E scp_v1s_request_pwd_change(struct SCP_CONNECTION* c, char* reason, char* npw)
|
|
{
|
|
return SCP_SERVER_STATE_INTERNAL_ERR;
|
|
}
|
|
/* 023 */
|
|
enum SCP_SERVER_STATES_E scp_v1s_pwd_change_error(struct SCP_CONNECTION* s, char* error, int retry, char* npw)
|
|
{
|
|
return SCP_SERVER_STATE_INTERNAL_ERR;
|
|
}
|
|
/* 030 */
|
|
enum SCP_SERVER_STATES_E scp_v1s_connect_new_session(struct SCP_CONNECTION* s, SCP_DISPLAY d)
|
|
{
|
|
return SCP_SERVER_STATE_INTERNAL_ERR;
|
|
}
|
|
/* 031 */
|
|
enum SCP_SERVER_STATES_E scp_v1s_reconnect_session(struct SCP_CONNECTION* s, SCP_DISPLAY d)
|
|
{
|
|
return SCP_SERVER_STATE_INTERNAL_ERR;
|
|
}
|
|
/* 032 */
|
|
enum SCP_SERVER_STATES_E scp_v1s_connection_error(struct SCP_CONNECTION* s, char* error)
|
|
{
|
|
return SCP_SERVER_STATE_INTERNAL_ERR;
|
|
}
|
|
/* 040 */
|
|
enum SCP_SERVER_STATES_E scp_v1s_list_sessions(struct SCP_CONNECTION* s, int sescnt, struct SCP_DISCONNECTED_SESSION** ds, SCP_SID* sid)
|
|
{
|
|
return SCP_SERVER_STATE_INTERNAL_ERR;
|
|
}
|
|
|
|
#endif
|