summaryrefslogtreecommitdiffstats
path: root/sesman/libscp_v1c.c
diff options
context:
space:
mode:
Diffstat (limited to 'sesman/libscp_v1c.c')
-rw-r--r--sesman/libscp_v1c.c447
1 files changed, 0 insertions, 447 deletions
diff --git a/sesman/libscp_v1c.c b/sesman/libscp_v1c.c
deleted file mode 100644
index 82242f2b..00000000
--- a/sesman/libscp_v1c.c
+++ /dev/null
@@ -1,447 +0,0 @@
-/*
- This program is free software; you can redistribute it and/or modify
- it under the terms of the GNU General Public License as published by
- the Free Software Foundation; either version 2 of the License, or
- (at your option) any later version.
-
- This program is distributed in the hope that it will be useful,
- but WITHOUT ANY WARRANTY; without even the implied warranty of
- MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- GNU General Public License for more details.
-
- You should have received a copy of the GNU General Public License
- along with this program; if not, write to the Free Software
- Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
-
- xrdp: A Remote Desktop Protocol server.
- Copyright (C) Jay Sorg 2005-2007
-*/
-
-/**
- *
- * @file libscp_v1c.c
- * @brief libscp version 1 client api code
- * @author Simone Fedele
- *
- */
-
-#include "libscp_v1c.h"
-
-#include <stdlib.h>
-#include <stdio.h>
-
-static enum SCP_CLIENT_STATES_E _scp_v1c_check_response(struct SCP_CONNECTION* c, struct SCP_SESSION* s);
-
-/* client API */
-/* 001 */
-enum SCP_CLIENT_STATES_E scp_v1c_connect(struct SCP_CONNECTION* c, struct SCP_SESSION* s)
-{
- tui8 sz;
- tui32 size;
-
- init_stream(c->out_s, c->out_s->size);
- init_stream(c->in_s, c->in_s->size);
-
- size=19+17+4+ g_strlen(s->hostname) + g_strlen(s->username) + g_strlen(s->password);
- if (s->addr_type==SCP_ADDRESS_TYPE_IPV4)
- {
- size=size+4;
- }
- else
- {
- size=size+16;
- }
-
- /* sending request */
-
- /* header */
- out_uint32_be(c->out_s, 1); /* version */
- out_uint32_be(c->out_s, size);
- out_uint16_be(c->out_s, SCP_COMMAND_SET_DEFAULT);
- out_uint16_be(c->out_s, 1);
-
- /* body */
- out_uint8(c->out_s, s->type);
- out_uint16_be(c->out_s, s->height);
- out_uint16_be(c->out_s, s->width);
- out_uint8(c->out_s, s->bpp);
- out_uint8(c->out_s, s->rsr);
- out_uint8p(c->out_s, s->locale, 17);
- out_uint8(c->out_s, s->addr_type);
-
- if (s->addr_type==SCP_ADDRESS_TYPE_IPV4)
- {
- out_uint32_be(c->out_s, s->ipv4addr);
- }
- else
- {
- #warning ipv6 address needed
- }
-
- sz=g_strlen(s->hostname);
- out_uint8(c->out_s, sz);
- out_uint8p(c->out_s, s->hostname, sz);
- sz=g_strlen(s->username);
- out_uint8(c->out_s, sz);
- out_uint8p(c->out_s, s->username, sz);
- sz=g_strlen(s->password);
- out_uint8(c->out_s, sz);
- out_uint8p(c->out_s, s->password, sz);
-
- if (0!=tcp_force_send(c->in_sck, c->out_s->data, size))
- {
- return SCP_CLIENT_STATE_NETWORK_ERR;
- }
-
- /* wait for response */
- return _scp_v1c_check_response(c, s);
-}
-
-/* 004 */
-enum SCP_CLIENT_STATES_E scp_v1c_resend_credentials(struct SCP_CONNECTION* c, struct SCP_SESSION* s)
-{
- tui8 sz;
- tui32 size;
-
- init_stream(c->out_s, c->out_s->size);
- init_stream(c->in_s, c->in_s->size);
-
- size=12+2+g_strlen(s->username)+g_strlen(s->password);
-
- /* sending request */
- /* header */
- out_uint32_be(c->out_s, 1); /* version */
- out_uint32_be(c->out_s, size);
- out_uint16_be(c->out_s, SCP_COMMAND_SET_DEFAULT);
- out_uint16_be(c->out_s, 4);
-
- /* body */
- sz=g_strlen(s->username);
- out_uint8(c->out_s, sz);
- out_uint8p(c->out_s, s->username, sz);
- sz=g_strlen(s->password);
- out_uint8(c->out_s, sz);
- out_uint8p(c->out_s, s->password, sz);
-
- if (0!=tcp_force_send(c->in_sck, c->out_s->data, size))
- {
- return SCP_CLIENT_STATE_NETWORK_ERR;
- }
-
- /* wait for response */
- return _scp_v1c_check_response(c, s);
-}
-
-/* 021 */ enum SCP_CLIENT_STATES_E scp_v1c_pwd_change(struct SCP_CONNECTION* c, char* newpass);
-/* 022 */ enum SCP_CLIENT_STATES_E scp_v1c_pwd_change_cancel(struct SCP_CONNECTION* c);
-
-/* 041 */
-enum SCP_CLIENT_STATES_E
-scp_v1c_get_session_list(struct SCP_CONNECTION* c, int* scount, struct SCP_DISCONNECTED_SESSION** s)
-{
- tui32 version=1;
- tui32 size=12;
- tui16 cmd=41;
- tui32 sescnt=0; /* total session number */
- tui32 sestmp=0; /* additional total session number */
- tui8 pktcnt=0; /* packet session count */
- tui32 totalcnt=0; /* session counter */
- tui8 continued=0; /* continue flag */
- int firstpkt=1; /* "first packet" flag */
- int idx;
- struct SCP_DISCONNECTED_SESSION* ds=0;
-
- init_stream(c->out_s, c->out_s->size);
-
- /* we request session list */
- out_uint32_be(c->out_s, version); /* version */
- out_uint32_be(c->out_s, size); /* size */
- out_uint16_be(c->out_s, SCP_COMMAND_SET_DEFAULT); /* cmdset */
- out_uint16_be(c->out_s, cmd); /* cmd */
-
- if (0!=tcp_force_send(c->in_sck, c->out_s->data, size))
- {
- return SCP_CLIENT_STATE_NETWORK_ERR;
- }
-
- do
- {
- /* then we wait for server response */
- init_stream(c->in_s, c->in_s->size);
- if (0!=tcp_force_recv(c->in_sck, c->in_s->data, 8))
- {
- return SCP_CLIENT_STATE_NETWORK_ERR;
- }
-
- in_uint32_be(c->in_s, version);
- if (version!=1)
- {
- return SCP_CLIENT_STATE_VERSION_ERR;
- }
-
- in_uint32_be(c->in_s, size);
- if (size<12)
- {
- return SCP_CLIENT_STATE_SIZE_ERR;
- }
-
- init_stream(c->in_s, c->in_s->size);
- if (0!=tcp_force_recv(c->in_sck, c->in_s->data, size-8))
- {
- return SCP_CLIENT_STATE_NETWORK_ERR;
- }
-
- in_uint16_be(c->in_s, cmd);
- if (cmd!=SCP_COMMAND_SET_DEFAULT)
- {
- return SCP_CLIENT_STATE_SEQUENCE_ERR;
- }
-
- in_uint16_be(c->in_s, cmd);
- if (cmd!=42)
- {
- return SCP_CLIENT_STATE_SEQUENCE_ERR;
- }
-
- if (firstpkt)
- {
- firstpkt = 0;
- in_uint32_be(c->in_s, sescnt);
- sestmp = sescnt;
-
- ds = g_malloc(sizeof(struct SCP_DISCONNECTED_SESSION)*sescnt, 0);
- if (ds == 0)
- {
- return SCP_CLIENT_STATE_INTERNAL_ERR;
- }
- }
- else
- {
- in_uint32_be(c->in_s, sestmp);
- }
- in_uint8(c->in_s, continued);
- in_uint8(c->in_s, pktcnt);
-
- for (idx=0; idx<pktcnt; idx++)
- {
- in_uint32_be(c->in_s, (ds[totalcnt]).SID); /* session id */
- in_uint8(c->in_s, (ds[totalcnt]).type);
- in_uint16_be(c->in_s, (ds[totalcnt]).height);
- in_uint16_be(c->in_s, (ds[totalcnt]).width);
- in_uint8(c->in_s, (ds[totalcnt]).bpp);
- in_uint8(c->in_s, (ds[totalcnt]).idle_days);
- in_uint8(c->in_s, (ds[totalcnt]).idle_hours);
- in_uint8(c->in_s, (ds[totalcnt]).idle_minutes);
- totalcnt++;
- }
- }
- while (continued);
-
- printf("fine\n");
- /* return data... */
- (*scount) = sescnt;
- (*s) = ds;
-
- return SCP_CLIENT_STATE_LIST_OK;
-}
-
-/* 043 */
-enum SCP_CLIENT_STATES_E
-scp_v1c_select_session(struct SCP_CONNECTION* c, struct SCP_SESSION* s, SCP_SID sid)
-{
- tui32 version = 1;
- tui32 size = 16;
- tui16 cmd = 43;
-
- init_stream(c->out_s, c->out_s->size);
-
- /* sending our selection */
- out_uint32_be(c->out_s, version); /* version */
- out_uint32_be(c->out_s, size); /* size */
- out_uint16_be(c->out_s, SCP_COMMAND_SET_DEFAULT); /* cmdset */
- out_uint16_be(c->out_s, cmd); /* cmd */
-
- out_uint32_be(c->out_s, sid);
-
- if (0!=tcp_force_send(c->in_sck, c->out_s->data, size))
- {
- return SCP_CLIENT_STATE_NETWORK_ERR;
- }
-
- /* waiting for response.... */
- init_stream(c->in_s, c->in_s->size);
- if (0!=tcp_force_recv(c->in_sck, c->in_s->data, 8))
- {
- return SCP_CLIENT_STATE_NETWORK_ERR;
- }
-
- in_uint32_be(c->in_s, version);
- if (version!=1)
- {
- return SCP_CLIENT_STATE_VERSION_ERR;
- }
-
- in_uint32_be(c->in_s, size);
- if (size<12)
- {
- return SCP_CLIENT_STATE_SIZE_ERR;
- }
-
- init_stream(c->in_s, c->in_s->size);
- /* read the rest of the packet */
- if (0!=tcp_force_recv(c->in_sck, c->in_s->data, size-8))
- {
- return SCP_CLIENT_STATE_NETWORK_ERR;
- }
-
- in_uint16_be(c->in_s, cmd);
- if (cmd != SCP_COMMAND_SET_DEFAULT)
- {
- return SCP_CLIENT_STATE_SEQUENCE_ERR;
- }
-
- in_uint16_be(c->in_s, cmd);
- if (cmd != 46)
- {
- return SCP_CLIENT_STATE_SEQUENCE_ERR;
- }
-
- /* session display */
- in_uint16_be(c->in_s, (s->display));
- /*we don't need to return any data other than the display */
- /*because we already sent that */
-
- return SCP_CLIENT_STATE_OK;
-}
-
-/* 044 */
-enum SCP_CLIENT_STATES_E
-scp_v1c_select_session_cancel(struct SCP_CONNECTION* c)
-{
- tui32 version = 1;
- tui32 size = 12;
- tui16 cmd = 44;
-
- init_stream(c->out_s, c->out_s->size);
-
- /* sending our selection */
- out_uint32_be(c->out_s, version); /* version */
- out_uint32_be(c->out_s, size); /* size */
- out_uint16_be(c->out_s, SCP_COMMAND_SET_DEFAULT); /* cmdset */
- out_uint16_be(c->out_s, cmd); /* cmd */
-
- if (0!=tcp_force_send(c->in_sck, c->out_s->data, size))
- {
- return SCP_CLIENT_STATE_NETWORK_ERR;
- }
-
- return SCP_CLIENT_STATE_END;
-}
-
-static enum SCP_CLIENT_STATES_E _scp_v1c_check_response(struct SCP_CONNECTION* c, struct SCP_SESSION* s)
-{
- tui32 version;
- tui32 size;
- tui16 cmd;
- tui16 dim;
-
- init_stream(c->in_s, c->in_s->size);
- if (0!=tcp_force_recv(c->in_sck, c->in_s->data, 8))
- {
- return SCP_CLIENT_STATE_NETWORK_ERR;
- }
-
- in_uint32_be(c->in_s, version);
- if (version!=1)
- {
- return SCP_CLIENT_STATE_VERSION_ERR;
- }
-
- in_uint32_be(c->in_s, size);
-
- init_stream(c->in_s, c->in_s->size);
- /* read the rest of the packet */
- if (0!=tcp_force_recv(c->in_sck, c->in_s->data, size-8))
- {
- return SCP_CLIENT_STATE_NETWORK_ERR;
- }
-
- in_uint16_be(c->in_s, cmd);
- if (cmd!=SCP_COMMAND_SET_DEFAULT)
- {
- return SCP_CLIENT_STATE_SEQUENCE_ERR;
- }
-
- in_uint16_be(c->in_s, cmd)
- if (cmd==2) /* connection denied */
- {
- in_uint16_be(c->in_s, dim);
- if (s->errstr!=0)
- {
- g_free(s->errstr);
- }
- s->errstr=g_malloc(dim+1,0);
- if (s->errstr==0)
- {
- return SCP_CLIENT_STATE_INTERNAL_ERR;
- }
- in_uint8a(c->in_s, s->errstr, dim);
- (s->errstr)[dim]='\0';
-
- return SCP_CLIENT_STATE_CONNECTION_DENIED;
- }
- else if (cmd==3) /* resend usr/pwd */
- {
- in_uint16_be(c->in_s, dim);
- if (s->errstr!=0)
- {
- g_free(s->errstr);
- }
- s->errstr=g_malloc(dim+1,0);
- if (s->errstr==0)
- {
- return SCP_CLIENT_STATE_INTERNAL_ERR;
- }
- in_uint8a(c->in_s, s->errstr, dim);
- (s->errstr)[dim]='\0';
-
- return SCP_CLIENT_STATE_RESEND_CREDENTIALS;
- }
- else if (cmd==20) /* password change */
- {
- in_uint16_be(c->in_s, dim);
- if (s->errstr!=0)
- {
- g_free(s->errstr);
- }
- s->errstr=g_malloc(dim+1,0);
- if (s->errstr==0)
- {
- return SCP_CLIENT_STATE_INTERNAL_ERR;
- }
- in_uint8a(c->in_s, s->errstr, dim);
- (s->errstr)[dim]='\0';
-
- return SCP_CLIENT_STATE_PWD_CHANGE_REQ;
- }
- else if (cmd==30) /* display */
- {
- in_uint16_be(c->in_s, s->display);
-
- return SCP_CLIENT_STATE_OK;
- }
- //else if (cmd==31) /* there's a disconnected session */
- //{
- // return SCP_CLIENT_STATE_RECONNECT_SINGLE;
- //}
- //else if (cmd==33) /* display of a disconnected session */
- //{
- // return SCP_CLIENT_STATE_RECONNECT;
- //}
- else if (cmd==40) /* session list */
- {
- return SCP_CLIENT_STATE_SESSION_LIST;
- }
-
- return SCP_CLIENT_STATE_SEQUENCE_ERR;
-}