/* -*- c-basic-offset: 8 -*- rdesktop: A Remote Desktop Protocol client. Entrypoint and utility functions Copyright (C) Matthew Chapman 1999-2008 Copyright 2002-2011 Peter Astrand for Cendio AB Copyright 2010-2014 Henrik Andersson for Cendio AB This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see . */ /* * Oracle GPL Disclaimer: For the avoidance of doubt, except that if any license choice * other than GPL or LGPL is available it will apply instead, Oracle elects to use only * the General Public License version 2 (GPLv2) at this time for any software where * a choice of GPL license versions is made available with the language indicating * that GPLv2 or any later version may be used, or where a choice of which version * of the GPL is applied is otherwise unspecified. */ #include /* va_list va_start va_end */ #include /* read close getuid getgid getpid getppid gethostname */ #include /* open */ #include /* getpwuid */ #include /* tcgetattr tcsetattr */ #include /* stat */ #include /* gettimeofday */ #include /* times */ #include /* toupper */ #include #include #include #include "rdesktop.h" #ifdef VBOX # include # include #endif #ifdef HAVE_LOCALE_H #include #endif #ifdef HAVE_ICONV #ifdef HAVE_LANGINFO_H #include #endif #endif #ifdef EGD_SOCKET #include #include /* socket connect */ #include /* sockaddr_un */ #endif #include "ssl.h" #if defined(VBOX) && defined(OPENSSL_MANGLER) # include #endif /* Reconnect timeout based on approxiamted cookie life-time */ #define RECONNECT_TIMEOUT (3600+600) #define RDESKTOP_LICENSE_STORE "/.local/share/rdesktop/licenses" uint8 g_static_rdesktop_salt_16[16] = { 0xb8, 0x82, 0x29, 0x31, 0xc5, 0x39, 0xd9, 0x44, 0x54, 0x15, 0x5e, 0x14, 0x71, 0x38, 0xd5, 0x4d }; char g_title[64] = ""; char *g_username; char g_password[64] = ""; char g_hostname[16] = ""; char g_keymapname[PATH_MAX] = ""; unsigned int g_keylayout = 0x409; /* Defaults to US keyboard layout */ int g_keyboard_type = 0x4; /* Defaults to US keyboard layout */ int g_keyboard_subtype = 0x0; /* Defaults to US keyboard layout */ int g_keyboard_functionkeys = 0xc; /* Defaults to US keyboard layout */ int g_sizeopt = 0; /* If non-zero, a special size has been requested. If 1, the geometry will be fetched from _NET_WORKAREA. If negative, absolute value specifies the percent of the whole screen. */ int g_width = 800; int g_height = 600; int g_xpos = 0; int g_ypos = 0; int g_pos = 0; /* 0 position unspecified, 1 specified, 2 xpos neg, 4 ypos neg */ extern int g_tcp_port_rdp; int g_server_depth = -1; int g_win_button_size = 0; /* If zero, disable single app mode */ RD_BOOL g_network_error = False; RD_BOOL g_bitmap_compression = True; RD_BOOL g_sendmotion = True; RD_BOOL g_bitmap_cache = True; RD_BOOL g_bitmap_cache_persist_enable = False; RD_BOOL g_bitmap_cache_precache = True; RD_BOOL g_use_ctrl = True; RD_BOOL g_encryption = True; RD_BOOL g_encryption_initial = True; RD_BOOL g_packet_encryption = True; RD_BOOL g_desktop_save = True; /* desktop save order */ RD_BOOL g_polygon_ellipse_orders = True; /* polygon / ellipse orders */ RD_BOOL g_fullscreen = False; RD_BOOL g_grab_keyboard = True; RD_BOOL g_hide_decorations = False; RDP_VERSION g_rdp_version = RDP_V5; /* Default to version 5 */ RD_BOOL g_rdpclip = True; RD_BOOL g_console_session = False; #ifndef VBOX RD_BOOL g_numlock_sync = False; #else /* VBOX */ /* Always use numlock synchronization with VRDP. */ RD_BOOL g_numlock_sync = True; #endif /* VBOX */ RD_BOOL g_lspci_enabled = False; RD_BOOL g_owncolmap = False; RD_BOOL g_ownbackstore = True; /* We can't rely on external BackingStore */ RD_BOOL g_seamless_rdp = False; RD_BOOL g_use_password_as_pin = False; char g_seamless_shell[512]; char g_seamless_spawn_cmd[512]; RD_BOOL g_seamless_persistent_mode = True; RD_BOOL g_user_quit = False; uint32 g_embed_wnd; uint32 g_rdp5_performanceflags = RDP5_NO_WALLPAPER | RDP5_NO_FULLWINDOWDRAG | RDP5_NO_MENUANIMATIONS | RDP5_NO_CURSOR_SHADOW; /* Session Directory redirection */ RD_BOOL g_redirect = False; char *g_redirect_server; uint32 g_redirect_server_len; char *g_redirect_domain; uint32 g_redirect_domain_len; char *g_redirect_username; uint32 g_redirect_username_len; uint8 *g_redirect_lb_info; uint32 g_redirect_lb_info_len; uint8 *g_redirect_cookie; uint32 g_redirect_cookie_len; uint32 g_redirect_flags = 0; uint32 g_redirect_session_id = 0; uint32 g_reconnect_logonid = 0; char g_reconnect_random[16]; time_t g_reconnect_random_ts; RD_BOOL g_has_reconnect_random = False; RD_BOOL g_reconnect_loop = False; uint8 g_client_random[SEC_RANDOM_SIZE]; RD_BOOL g_pending_resize = False; #ifdef WITH_RDPSND RD_BOOL g_rdpsnd = False; #endif #ifdef WITH_RDPUSB RD_BOOL g_rdpusb = False; #endif #ifdef WITH_BIRD_VD_HACKS RD_BOOL g_keep_virtual_desktop_shortcuts = False; #endif #ifdef HAVE_ICONV char g_codepage[16] = ""; #endif char *g_sc_csp_name = NULL; /* Smartcard CSP name */ char *g_sc_reader_name = NULL; char *g_sc_card_name = NULL; char *g_sc_container_name = NULL; extern RDPDR_DEVICE g_rdpdr_device[]; extern uint32 g_num_devices; extern char *g_rdpdr_clientname; #ifdef RDP2VNC extern int rfb_port; extern int defer_time; void rdp2vnc_connect(char *server, uint32 flags, char *domain, char *password, char *shell, char *directory); #endif /* Display usage information */ static void usage(char *program) { fprintf(stderr, "rdesktop: A Remote Desktop Protocol client.\n"); fprintf(stderr, "Version " PACKAGE_VERSION ". Copyright (C) 1999-2011 Matthew Chapman et al.\n"); #ifdef VBOX fprintf(stderr, "Modified for VirtualBox by " VBOX_VENDOR "\n"); #endif fprintf(stderr, "See http://www.rdesktop.org/ for more information.\n\n"); fprintf(stderr, "Usage: %s [options] server[:port]\n", program); #ifdef RDP2VNC fprintf(stderr, " -V: vnc port\n"); fprintf(stderr, " -Q: defer time (ms)\n"); #endif fprintf(stderr, " -u: user name\n"); fprintf(stderr, " -d: domain\n"); fprintf(stderr, " -s: shell / seamless application to start remotly\n"); fprintf(stderr, " -c: working directory\n"); fprintf(stderr, " -p: password (- to prompt)\n"); fprintf(stderr, " -n: client hostname\n"); fprintf(stderr, " -k: keyboard layout on server (en-us, de, sv, etc.)\n"); fprintf(stderr, " -g: desktop geometry (WxH)\n"); #ifdef WITH_SCARD fprintf(stderr, " -i: enables smartcard authentication, password is used as pin\n"); #endif fprintf(stderr, " -f: full-screen mode\n"); fprintf(stderr, " -b: force bitmap updates\n"); #ifdef HAVE_ICONV fprintf(stderr, " -L: local codepage\n"); #endif fprintf(stderr, " -A: path to SeamlessRDP shell, this enables SeamlessRDP mode\n"); fprintf(stderr, " -B: use BackingStore of X-server (if available)\n"); fprintf(stderr, " -e: disable encryption (French TS)\n"); fprintf(stderr, " -E: disable encryption from client to server\n"); fprintf(stderr, " -m: do not send motion events\n"); fprintf(stderr, " -C: use private colour map\n"); fprintf(stderr, " -D: hide window manager decorations\n"); fprintf(stderr, " -K: keep window manager key bindings\n"); fprintf(stderr, " -S: caption button size (single application mode)\n"); fprintf(stderr, " -T: window title\n"); fprintf(stderr, " -t: disable use of remote ctrl\n"); fprintf(stderr, " -N: enable numlock syncronization\n"); fprintf(stderr, " -X: embed into another window with a given id.\n"); fprintf(stderr, " -a: connection colour depth\n"); fprintf(stderr, " -z: enable rdp compression\n"); fprintf(stderr, " -x: RDP5 experience (m[odem 28.8], b[roadband], l[an] or hex nr.)\n"); fprintf(stderr, " -P: use persistent bitmap caching\n"); fprintf(stderr, " -r: enable specified device redirection (this flag can be repeated)\n"); fprintf(stderr, " '-r comport:COM1=/dev/ttyS0': enable serial redirection of /dev/ttyS0 to COM1\n"); fprintf(stderr, " or COM1=/dev/ttyS0,COM2=/dev/ttyS1\n"); fprintf(stderr, " '-r disk:floppy=/mnt/floppy': enable redirection of /mnt/floppy to 'floppy' share\n"); fprintf(stderr, " or 'floppy=/mnt/floppy,cdrom=/mnt/cdrom'\n"); fprintf(stderr, " '-r clientname=': Set the client name displayed\n"); fprintf(stderr, " for redirected disks\n"); fprintf(stderr, " '-r lptport:LPT1=/dev/lp0': enable parallel redirection of /dev/lp0 to LPT1\n"); fprintf(stderr, " or LPT1=/dev/lp0,LPT2=/dev/lp1\n"); fprintf(stderr, " '-r printer:mydeskjet': enable printer redirection\n"); fprintf(stderr, " or mydeskjet=\"HP LaserJet IIIP\" to enter server driver as well\n"); #ifdef WITH_RDPSND fprintf(stderr, " '-r sound:[local[:driver[:device]]|off|remote]': enable sound redirection\n"); fprintf(stderr, " remote would leave sound on server\n"); fprintf(stderr, " available drivers for 'local':\n"); rdpsnd_show_help(); #endif #ifdef WITH_RDPUSB fprintf(stderr, " '-r usb': enable USB redirection\n"); #endif fprintf(stderr, " '-r clipboard:[off|PRIMARYCLIPBOARD|CLIPBOARD]': enable clipboard\n"); fprintf(stderr, " redirection.\n"); fprintf(stderr, " 'PRIMARYCLIPBOARD' looks at both PRIMARY and CLIPBOARD\n"); fprintf(stderr, " when sending data to server.\n"); fprintf(stderr, " 'CLIPBOARD' looks at only CLIPBOARD.\n"); #ifdef WITH_SCARD fprintf(stderr, " '-r scard[:\"Scard Name\"=\"Alias Name[;Vendor Name]\"[,...]]\n"); fprintf(stderr, " example: -r scard:\"eToken PRO 00 00\"=\"AKS ifdh 0\"\n"); fprintf(stderr, " \"eToken PRO 00 00\" -> Device in Linux/Unix enviroment\n"); fprintf(stderr, " \"AKS ifdh 0\" -> Device shown in Windows enviroment \n"); fprintf(stderr, " example: -r scard:\"eToken PRO 00 00\"=\"AKS ifdh 0;AKS\"\n"); fprintf(stderr, " \"eToken PRO 00 00\" -> Device in Linux/Unix enviroment\n"); fprintf(stderr, " \"AKS ifdh 0\" -> Device shown in Windows enviroment \n"); fprintf(stderr, " \"AKS\" -> Device vendor name \n"); #endif fprintf(stderr, " -0: attach to console\n"); fprintf(stderr, " -4: use RDP version 4\n"); fprintf(stderr, " -5: use RDP version 5 (default)\n"); #ifdef WITH_BIRD_VD_HACKS fprintf(stderr, " -H keep-virtual-desktop-shortcuts: Keep keyboard shortcuts typical\n" " for switching virtual desktops (C-A-Left/Right). \n"); #endif #ifdef WITH_SCARD fprintf(stderr, " -o: name=value: Adds an additional option to rdesktop.\n"); fprintf(stderr, " sc-csp-name Specifies the Crypto Service Provider name which\n"); fprintf(stderr, " is used to authenticate the user by smartcard\n"); fprintf(stderr, " sc-container-name Specifies the container name, this is usally the username\n"); fprintf(stderr, " sc-reader-name Smartcard reader name to use\n"); fprintf(stderr, " sc-card-name Specifies the card name of the smartcard to use\n"); #endif fprintf(stderr, "\n"); } static int handle_disconnect_reason(RD_BOOL deactivated, uint16 reason) { char *text; int retval; switch (reason) { case exDiscReasonNoInfo: text = "No information available"; if (deactivated) retval = EX_OK; else retval = EXRD_UNKNOWN; break; case exDiscReasonAPIInitiatedDisconnect: text = "Server initiated disconnect"; retval = EXRD_API_DISCONNECT; break; case exDiscReasonAPIInitiatedLogoff: text = "Server initiated logoff"; retval = EXRD_API_LOGOFF; break; case exDiscReasonServerIdleTimeout: text = "Server idle timeout reached"; retval = EXRD_IDLE_TIMEOUT; break; case exDiscReasonServerLogonTimeout: text = "Server logon timeout reached"; retval = EXRD_LOGON_TIMEOUT; break; case exDiscReasonReplacedByOtherConnection: text = "The session was replaced"; retval = EXRD_REPLACED; break; case exDiscReasonOutOfMemory: text = "The server is out of memory"; retval = EXRD_OUT_OF_MEM; break; case exDiscReasonServerDeniedConnection: text = "The server denied the connection"; retval = EXRD_DENIED; break; case exDiscReasonServerDeniedConnectionFips: text = "The server denied the connection for security reason"; retval = EXRD_DENIED_FIPS; break; case exDiscReasonServerInsufficientPrivileges: text = "The user cannot connect to the server due to insufficient access privileges."; retval = EXRD_INSUFFICIENT_PRIVILEGES; break; case exDiscReasonServerFreshCredentialsRequired: text = "The server does not accept saved user credentials and requires that the user enter their credentials for each connection."; retval = EXRD_FRESH_CREDENTIALS_REQUIRED; break; case exDiscReasonRPCInitiatedDisconnectByUser: text = "Disconnect initiated by administration tool"; retval = EXRD_RPC_DISCONNECT_BY_USER; break; case exDiscReasonByUser: text = "Disconnect initiated by user"; retval = EXRD_DISCONNECT_BY_USER; break; case exDiscReasonLicenseInternal: text = "Internal licensing error"; retval = EXRD_LIC_INTERNAL; break; case exDiscReasonLicenseNoLicenseServer: text = "No license server available"; retval = EXRD_LIC_NOSERVER; break; case exDiscReasonLicenseNoLicense: text = "No valid license available"; retval = EXRD_LIC_NOLICENSE; break; case exDiscReasonLicenseErrClientMsg: text = "Invalid licensing message"; retval = EXRD_LIC_MSG; break; case exDiscReasonLicenseHwidDoesntMatchLicense: text = "Hardware id doesn't match software license"; retval = EXRD_LIC_HWID; break; case exDiscReasonLicenseErrClientLicense: text = "Client license error"; retval = EXRD_LIC_CLIENT; break; case exDiscReasonLicenseCantFinishProtocol: text = "Network error during licensing protocol"; retval = EXRD_LIC_NET; break; case exDiscReasonLicenseClientEndedProtocol: text = "Licensing protocol was not completed"; retval = EXRD_LIC_PROTO; break; case exDiscReasonLicenseErrClientEncryption: text = "Incorrect client license encryption"; retval = EXRD_LIC_ENC; break; case exDiscReasonLicenseCantUpgradeLicense: text = "Can't upgrade license"; retval = EXRD_LIC_UPGRADE; break; case exDiscReasonLicenseNoRemoteConnections: text = "The server is not licensed to accept remote connections"; retval = EXRD_LIC_NOREMOTE; break; default: if (reason > 0x1000 && reason < 0x7fff) { text = "Internal protocol error"; } else { text = "Unknown reason"; } retval = EXRD_UNKNOWN; } if (reason != exDiscReasonNoInfo) fprintf(stderr, "disconnect: %s.\n", text); return retval; } static void rdesktop_reset_state(void) { rdp_reset_state(); #ifdef WITH_SCARD scard_reset_state(); #endif #ifdef WITH_RDPSND rdpsnd_reset_state(); #endif } static RD_BOOL read_password(char *password, int size) { struct termios tios; RD_BOOL ret = False; int istty = 0; char *p; if (tcgetattr(STDIN_FILENO, &tios) == 0) { fprintf(stderr, "Password: "); tios.c_lflag &= ~ECHO; tcsetattr(STDIN_FILENO, TCSANOW, &tios); istty = 1; } if (fgets(password, size, stdin) != NULL) { ret = True; /* strip final newline */ p = strchr(password, '\n'); if (p != NULL) *p = 0; } if (istty) { tios.c_lflag |= ECHO; tcsetattr(STDIN_FILENO, TCSANOW, &tios); fprintf(stderr, "\n"); } return ret; } static void parse_server_and_port(char *server) { char *p; #ifdef IPv6 int addr_colons; #endif #ifdef IPv6 p = server; addr_colons = 0; while (*p) if (*p++ == ':') addr_colons++; if (addr_colons >= 2) { /* numeric IPv6 style address format - [1:2:3::4]:port */ p = strchr(server, ']'); if (*server == '[' && p != NULL) { if (*(p + 1) == ':' && *(p + 2) != '\0') g_tcp_port_rdp = strtol(p + 2, NULL, 10); /* remove the port number and brackets from the address */ *p = '\0'; strncpy(server, server + 1, strlen(server)); } } else { /* dns name or IPv4 style address format - server.example.com:port or 1.2.3.4:port */ p = strchr(server, ':'); if (p != NULL) { g_tcp_port_rdp = strtol(p + 1, NULL, 10); *p = 0; } } #else /* no IPv6 support */ p = strchr(server, ':'); if (p != NULL) { g_tcp_port_rdp = strtol(p + 1, NULL, 10); *p = 0; } #endif /* IPv6 */ } #ifdef VBOX /* This disables iprt logging */ DECLEXPORT(PRTLOGGER) RTCALL RTLogDefaultInit(void) { return NULL; } #endif /* Client program */ int main(int argc, char *argv[]) { char server[256]; char fullhostname[64]; char domain[256]; char shell[256]; char directory[256]; RD_BOOL prompt_password, deactivated; struct passwd *pw; uint32 flags, ext_disc_reason = 0; char *p; int c; char *locale = NULL; int username_option = 0; RD_BOOL geometry_option = False; #ifdef WITH_RDPSND char *rdpsnd_optarg = NULL; #endif #if defined(VBOX) && defined(OPENSSL_MANGLER) /* Only need RT initialization if building against OpenSSL using * RT synchronization, standalone rdesktop doesn't need this. */ RTR3InitExe(argc, &argv, 0); #endif #ifdef HAVE_LOCALE_H /* Set locale according to environment */ locale = setlocale(LC_ALL, ""); if (locale) { locale = xstrdup(locale); } #endif /* Ignore SIGPIPE, since we are using popen() */ struct sigaction act; memset(&act, 0, sizeof(act)); act.sa_handler = SIG_IGN; sigemptyset(&act.sa_mask); act.sa_flags = 0; sigaction(SIGPIPE, &act, NULL); /* setup default flags for TS_INFO_PACKET */ flags = RDP_INFO_MOUSE | RDP_INFO_DISABLECTRLALTDEL | RDP_INFO_UNICODE | RDP_INFO_MAXIMIZESHELL | RDP_INFO_ENABLEWINDOWSKEY; prompt_password = False; g_seamless_spawn_cmd[0] = domain[0] = g_password[0] = shell[0] = directory[0] = 0; g_embed_wnd = 0; g_num_devices = 0; #ifdef RDP2VNC #define VNCOPT "V:Q:" #else #define VNCOPT #endif #ifdef WITH_BIRD_VD_HACKS #define VDHOPT "H:" #else #define VDHOPT #endif while ((c = getopt(argc, argv, VNCOPT VDHOPT "A:u:L:d:s:c:p:n:k:g:o:fbBeEitmzCDKS:T:NX:a:x:Pr:045h?")) != -1) { switch (c) { #ifdef RDP2VNC case 'V': rfb_port = strtol(optarg, NULL, 10); if (rfb_port < 100) rfb_port += 5900; break; case 'Q': defer_time = strtol(optarg, NULL, 10); if (defer_time < 0) defer_time = 0; break; #endif case 'A': g_seamless_rdp = True; STRNCPY(g_seamless_shell, optarg, sizeof(g_seamless_shell)); break; case 'u': g_username = (char *) xmalloc(strlen(optarg) + 1); STRNCPY(g_username, optarg, strlen(optarg) + 1); username_option = 1; break; case 'L': #ifdef HAVE_ICONV STRNCPY(g_codepage, optarg, sizeof(g_codepage)); #else error("iconv support not available\n"); #endif break; case 'd': STRNCPY(domain, optarg, sizeof(domain)); break; case 's': STRNCPY(shell, optarg, sizeof(shell)); g_seamless_persistent_mode = False; break; case 'c': STRNCPY(directory, optarg, sizeof(directory)); break; case 'p': if ((optarg[0] == '-') && (optarg[1] == 0)) { prompt_password = True; break; } STRNCPY(g_password, optarg, sizeof(g_password)); flags |= RDP_INFO_AUTOLOGON; /* try to overwrite argument so it won't appear in ps */ p = optarg; while (*p) *(p++) = 'X'; break; #ifdef WITH_SCARD case 'i': flags |= RDP_INFO_PASSWORD_IS_SC_PIN; g_use_password_as_pin = True; break; #endif case 't': g_use_ctrl = False; break; case 'n': STRNCPY(g_hostname, optarg, sizeof(g_hostname)); break; case 'k': STRNCPY(g_keymapname, optarg, sizeof(g_keymapname)); break; case 'g': geometry_option = True; g_fullscreen = False; if (!strcmp(optarg, "workarea")) { g_sizeopt = 1; break; } g_width = strtol(optarg, &p, 10); if (g_width <= 0) { error("invalid geometry\n"); return EX_USAGE; } if (*p == 'x') g_height = strtol(p + 1, &p, 10); if (g_height <= 0) { error("invalid geometry\n"); return EX_USAGE; } if (*p == '%') { g_sizeopt = -g_width; g_width = 800; p++; } if (*p == '+' || *p == '-') { g_pos |= (*p == '-') ? 2 : 1; g_xpos = strtol(p, &p, 10); } if (*p == '+' || *p == '-') { g_pos |= (*p == '-') ? 4 : 1; g_ypos = strtol(p, NULL, 10); } break; case 'f': g_fullscreen = True; break; case 'b': g_bitmap_cache = False; break; case 'B': g_ownbackstore = False; break; case 'e': g_encryption_initial = g_encryption = False; break; case 'E': g_packet_encryption = False; break; case 'm': g_sendmotion = False; break; case 'C': g_owncolmap = True; break; case 'D': g_hide_decorations = True; break; case 'K': g_grab_keyboard = False; break; case 'S': if (!strcmp(optarg, "standard")) { g_win_button_size = 18; break; } g_win_button_size = strtol(optarg, &p, 10); if (*p) { error("invalid button size\n"); return EX_USAGE; } break; case 'T': STRNCPY(g_title, optarg, sizeof(g_title)); break; case 'N': g_numlock_sync = True; break; case 'X': g_embed_wnd = strtol(optarg, NULL, 0); break; case 'a': g_server_depth = strtol(optarg, NULL, 10); if (g_server_depth != 8 && g_server_depth != 16 && g_server_depth != 15 && g_server_depth != 24 && g_server_depth != 32) { error("Invalid server colour depth.\n"); return EX_USAGE; } break; case 'z': DEBUG(("rdp compression enabled\n")); flags |= (RDP_INFO_COMPRESSION | RDP_INFO_COMPRESSION2); break; case 'x': if (str_startswith(optarg, "m")) /* modem */ { g_rdp5_performanceflags = RDP5_NO_CURSOR_SHADOW | RDP5_NO_WALLPAPER | RDP5_NO_FULLWINDOWDRAG | RDP5_NO_MENUANIMATIONS | RDP5_NO_THEMING; } else if (str_startswith(optarg, "b")) /* broadband */ { g_rdp5_performanceflags = RDP5_NO_CURSOR_SHADOW | RDP5_NO_WALLPAPER; } else if (str_startswith(optarg, "l")) /* lan */ { g_rdp5_performanceflags = RDP5_NO_CURSOR_SHADOW | RDP5_DISABLE_NOTHING; } else { g_rdp5_performanceflags = RDP5_NO_CURSOR_SHADOW | strtol(optarg, NULL, 16); } break; case 'P': g_bitmap_cache_persist_enable = True; break; case 'r': if (str_startswith(optarg, "sound")) { optarg += 5; if (*optarg == ':') { optarg++; while ((p = next_arg(optarg, ','))) { if (str_startswith(optarg, "remote")) flags |= RDP_INFO_REMOTE_CONSOLE_AUDIO; if (str_startswith(optarg, "local")) #ifdef WITH_RDPSND { rdpsnd_optarg = next_arg(optarg, ':'); g_rdpsnd = True; } #else warning("Not compiled with sound support\n"); #endif if (str_startswith(optarg, "off")) #ifdef WITH_RDPSND g_rdpsnd = False; #else warning("Not compiled with sound support\n"); #endif optarg = p; } } else { #ifdef WITH_RDPSND g_rdpsnd = True; #else warning("Not compiled with sound support\n"); #endif } } else if (str_startswith(optarg, "usb")) { #ifdef WITH_RDPUSB g_rdpusb = True; #else warning("Not compiled with USB support\n"); #endif } else if (str_startswith(optarg, "disk")) { /* -r disk:h:=/mnt/floppy */ disk_enum_devices(&g_num_devices, optarg + 4); } else if (str_startswith(optarg, "comport")) { serial_enum_devices(&g_num_devices, optarg + 7); } else if (str_startswith(optarg, "lspci")) { g_lspci_enabled = True; } else if (str_startswith(optarg, "lptport")) { parallel_enum_devices(&g_num_devices, optarg + 7); } else if (str_startswith(optarg, "printer")) { printer_enum_devices(&g_num_devices, optarg + 7); } else if (str_startswith(optarg, "clientname")) { g_rdpdr_clientname = xmalloc(strlen(optarg + 11) + 1); strcpy(g_rdpdr_clientname, optarg + 11); } else if (str_startswith(optarg, "clipboard")) { optarg += 9; if (*optarg == ':') { optarg++; if (str_startswith(optarg, "off")) g_rdpclip = False; else cliprdr_set_mode(optarg); } else g_rdpclip = True; } else if (strncmp("scard", optarg, 5) == 0) { #ifdef WITH_SCARD scard_enum_devices(&g_num_devices, optarg + 5); #else warning("Not compiled with smartcard support\n"); #endif } else { warning("Unknown -r argument\n\n\tPossible arguments are: comport, disk, lptport, printer, sound, clipboard, scard\n"); } break; case '0': g_console_session = True; break; case '4': g_rdp_version = RDP_V4; break; case '5': g_rdp_version = RDP_V5; break; #if WITH_SCARD case 'o': { char *p = strchr(optarg, '='); if (p == NULL) { warning("Skipping option '%s' specified, lacks name=value format.\n"); continue; } if (strncmp(optarg, "sc-csp-name", strlen("sc-scp-name")) == 0) g_sc_csp_name = strdup(p + 1); else if (strncmp (optarg, "sc-reader-name", strlen("sc-reader-name")) == 0) g_sc_reader_name = strdup(p + 1); else if (strncmp (optarg, "sc-card-name", strlen("sc-card-name")) == 0) g_sc_card_name = strdup(p + 1); else if (strncmp (optarg, "sc-container-name", strlen("sc-container-name")) == 0) g_sc_container_name = strdup(p + 1); } break; #endif #ifdef WITH_BIRD_VD_HACKS case 'H': /* hacks */ if (!strcmp(optarg, "keep-virtual-desktop-shortcuts")) g_keep_virtual_desktop_shortcuts = True; else error("Unknown -H argument\n\n\tPossible argument is: keep-virtual-desktop-shortcuts\n"); break; #endif case 'h': case '?': default: usage(argv[0]); return EX_USAGE; } } if (argc - optind != 1) { usage(argv[0]); return EX_USAGE; } STRNCPY(server, argv[optind], sizeof(server)); parse_server_and_port(server); if (g_seamless_rdp) { if (shell[0]) STRNCPY(g_seamless_spawn_cmd, shell, sizeof(g_seamless_spawn_cmd)); STRNCPY(shell, g_seamless_shell, sizeof(shell)); if (g_win_button_size) { error("You cannot use -S and -A at the same time\n"); return EX_USAGE; } g_rdp5_performanceflags &= ~RDP5_NO_FULLWINDOWDRAG; if (geometry_option) { error("You cannot use -g and -A at the same time\n"); return EX_USAGE; } if (g_fullscreen) { error("You cannot use -f and -A at the same time\n"); return EX_USAGE; } if (g_hide_decorations) { error("You cannot use -D and -A at the same time\n"); return EX_USAGE; } if (g_embed_wnd) { error("You cannot use -X and -A at the same time\n"); return EX_USAGE; } if (g_rdp_version < RDP_V5) { error("You cannot use -4 and -A at the same time\n"); return EX_USAGE; } g_sizeopt = -100; g_grab_keyboard = False; } if (!username_option) { pw = getpwuid(getuid()); if ((pw == NULL) || (pw->pw_name == NULL)) { error("could not determine username, use -u\n"); return EX_OSERR; } /* +1 for trailing \0 */ int pwlen = strlen(pw->pw_name) + 1; g_username = (char *) xmalloc(pwlen); STRNCPY(g_username, pw->pw_name, pwlen); } #ifdef HAVE_ICONV if (g_codepage[0] == 0) { if (setlocale(LC_CTYPE, "")) { STRNCPY(g_codepage, nl_langinfo(CODESET), sizeof(g_codepage)); } else { STRNCPY(g_codepage, DEFAULT_CODEPAGE, sizeof(g_codepage)); } } #endif if (g_hostname[0] == 0) { if (gethostname(fullhostname, sizeof(fullhostname)) == -1) { error("could not determine local hostname, use -n\n"); return EX_OSERR; } p = strchr(fullhostname, '.'); if (p != NULL) *p = 0; STRNCPY(g_hostname, fullhostname, sizeof(g_hostname)); } if (g_keymapname[0] == 0) { if (locale && xkeymap_from_locale(locale)) { fprintf(stderr, "Autoselected keyboard map %s\n", g_keymapname); } else { STRNCPY(g_keymapname, "en-us", sizeof(g_keymapname)); } } if (locale) xfree(locale); if (prompt_password && read_password(g_password, sizeof(g_password))) flags |= RDP_INFO_AUTOLOGON; if (g_title[0] == 0) { strcpy(g_title, "rdesktop - "); strncat(g_title, server, sizeof(g_title) - sizeof("rdesktop - ")); } #ifdef RDP2VNC rdp2vnc_connect(server, flags, domain, g_password, shell, directory); return EX_OK; #else /* Only startup ctrl functionality is seamless are used for now. */ if (g_use_ctrl && g_seamless_rdp) { if (ctrl_init(server, domain, g_username) < 0) { error("Failed to initialize ctrl mode."); exit(1); } if (ctrl_is_slave()) { fprintf(stdout, "rdesktop in slave mode sending command to master process.\n"); if (g_seamless_spawn_cmd[0]) return ctrl_send_command("seamless.spawn", g_seamless_spawn_cmd); fprintf(stdout, "No command specified to be spawn in seamless mode.\n"); return EX_USAGE; } } if (!ui_init()) return EX_OSERR; #ifdef WITH_RDPSND if (!rdpsnd_init(rdpsnd_optarg)) warning("Initializing sound-support failed!\n"); #endif #ifdef WITH_RDPUSB if (g_rdpusb) rdpusb_init(); #endif if (g_lspci_enabled) lspci_init(); rdpdr_init(); g_reconnect_loop = False; while (1) { rdesktop_reset_state(); if (g_redirect) { STRNCPY(domain, g_redirect_domain, sizeof(domain)); xfree(g_username); g_username = (char *) xmalloc(strlen(g_redirect_username) + 1); STRNCPY(g_username, g_redirect_username, strlen(g_redirect_username) + 1); STRNCPY(server, g_redirect_server, sizeof(server)); flags |= RDP_INFO_AUTOLOGON; fprintf(stderr, "Redirected to %s@%s session %d.\n", g_redirect_username, g_redirect_server, g_redirect_session_id); /* A redirect on SSL from a 2003 WTS will result in a 'connection reset by peer' and therefor we just clear this error before we connect to redirected server. */ g_network_error = False; g_redirect = False; } ui_init_connection(); if (!rdp_connect (server, flags, domain, g_password, shell, directory, g_reconnect_loop)) { g_network_error = False; if (g_reconnect_loop == False) return EX_PROTOCOL; /* check if auto reconnect cookie has timed out */ if (time(NULL) - g_reconnect_random_ts > RECONNECT_TIMEOUT) { fprintf(stderr, "Tried to reconnect for %d minutes, giving up.\n", RECONNECT_TIMEOUT / 60); return EX_PROTOCOL; } sleep(4); continue; } if (g_redirect) { rdp_disconnect(); continue; } /* By setting encryption to False here, we have an encrypted login packet but unencrypted transfer of other packets */ if (!g_packet_encryption) g_encryption_initial = g_encryption = False; DEBUG(("Connection successful.\n")); rd_create_ui(); tcp_run_ui(True); deactivated = False; g_reconnect_loop = False; rdp_main_loop(&deactivated, &ext_disc_reason); tcp_run_ui(False); DEBUG(("Disconnecting...\n")); rdp_disconnect(); if (g_redirect) continue; /* handle network error and start autoreconnect */ if (g_network_error && !deactivated) { fprintf(stderr, "Disconnected due to network error, retrying to reconnect for %d minutes.\n", RECONNECT_TIMEOUT / 60); g_network_error = False; g_reconnect_loop = True; continue; } ui_seamless_end(); ui_destroy_window(); /* Enter a reconnect loop if we have a pending resize request */ if (g_pending_resize) { g_pending_resize = False; g_reconnect_loop = True; continue; } break; } cache_save_state(); ui_deinit(); #ifdef WITH_RDPUSB if (g_rdpusb) rdpusb_close(); #endif if (g_user_quit) return EXRD_WINDOW_CLOSED; return handle_disconnect_reason(deactivated, ext_disc_reason); #endif if (g_redirect_username) xfree(g_redirect_username); xfree(g_username); } #ifdef EGD_SOCKET /* Read 32 random bytes from PRNGD or EGD socket (based on OpenSSL RAND_egd) */ static RD_BOOL generate_random_egd(uint8 * buf) { struct sockaddr_un addr; RD_BOOL ret = False; int fd; fd = socket(AF_UNIX, SOCK_STREAM, 0); if (fd == -1) return False; addr.sun_family = AF_UNIX; memcpy(addr.sun_path, EGD_SOCKET, sizeof(EGD_SOCKET)); if (connect(fd, (struct sockaddr *) &addr, sizeof(addr)) == -1) goto err; /* PRNGD and EGD use a simple communications protocol */ buf[0] = 1; /* Non-blocking (similar to /dev/urandom) */ buf[1] = 32; /* Number of requested random bytes */ if (write(fd, buf, 2) != 2) goto err; if ((read(fd, buf, 1) != 1) || (buf[0] == 0)) /* Available? */ goto err; if (read(fd, buf, 32) != 32) goto err; ret = True; err: close(fd); return ret; } #endif /* Generate a 32-byte random for the secure transport code. */ void generate_random(uint8 * random) { struct stat st; struct tms tmsbuf; RDSSL_MD5 md5; uint32 *r; int fd, n; /* If we have a kernel random device, try that first */ if (((fd = open("/dev/urandom", O_RDONLY)) != -1) || ((fd = open("/dev/random", O_RDONLY)) != -1)) { n = read(fd, random, 32); close(fd); if (n == 32) return; } #ifdef EGD_SOCKET /* As a second preference use an EGD */ if (generate_random_egd(random)) return; #endif /* Otherwise use whatever entropy we can gather - ideas welcome. */ r = (uint32 *) random; r[0] = (getpid()) | (getppid() << 16); r[1] = (getuid()) | (getgid() << 16); r[2] = times(&tmsbuf); /* system uptime (clocks) */ gettimeofday((struct timeval *) &r[3], NULL); /* sec and usec */ stat("/tmp", &st); r[5] = st.st_atime; r[6] = st.st_mtime; r[7] = st.st_ctime; /* Hash both halves with MD5 to obscure possible patterns */ rdssl_md5_init(&md5); rdssl_md5_update(&md5, random, 16); rdssl_md5_final(&md5, random); rdssl_md5_update(&md5, random + 16, 16); rdssl_md5_final(&md5, random + 16); } /* malloc; exit if out of memory */ void * xmalloc(int size) { void *mem = malloc(size); if (mem == NULL) { error("xmalloc %d\n", size); exit(EX_UNAVAILABLE); } return mem; } /* Exit on NULL pointer. Use to verify result from XGetImage etc */ void exit_if_null(void *ptr) { if (ptr == NULL) { error("unexpected null pointer. Out of memory?\n"); exit(EX_UNAVAILABLE); } } /* strdup */ char * xstrdup(const char *s) { char *mem = strdup(s); if (mem == NULL) { perror("strdup"); exit(EX_UNAVAILABLE); } return mem; } /* realloc; exit if out of memory */ void * xrealloc(void *oldmem, size_t size) { void *mem; if (size == 0) size = 1; mem = realloc(oldmem, size); if (mem == NULL) { error("xrealloc %ld\n", size); exit(EX_UNAVAILABLE); } return mem; } /* free */ void xfree(void *mem) { free(mem); } /* report an error */ void error(char *format, ...) { va_list ap; fprintf(stderr, "ERROR: "); va_start(ap, format); vfprintf(stderr, format, ap); va_end(ap); } /* report a warning */ void warning(char *format, ...) { va_list ap; fprintf(stderr, "WARNING: "); va_start(ap, format); vfprintf(stderr, format, ap); va_end(ap); } /* report an unimplemented protocol feature */ void unimpl(char *format, ...) { va_list ap; fprintf(stderr, "NOT IMPLEMENTED: "); va_start(ap, format); vfprintf(stderr, format, ap); va_end(ap); } /* produce a hex dump */ void hexdump(unsigned char *p, unsigned int len) { unsigned char *line = p; int i, thisline, offset = 0; while (offset < len) { printf("%04x ", offset); thisline = len - offset; if (thisline > 16) thisline = 16; for (i = 0; i < thisline; i++) printf("%02x ", line[i]); for (; i < 16; i++) printf(" "); for (i = 0; i < thisline; i++) printf("%c", (line[i] >= 0x20 && line[i] < 0x7f) ? line[i] : '.'); printf("\n"); offset += thisline; line += thisline; } } /* input: src is the string we look in for needle. Needle may be escaped by a backslash, in that case we ignore that particular needle. return value: returns next src pointer, for succesive executions, like in a while loop if retval is 0, then there are no more args. pitfalls: src is modified. 0x00 chars are inserted to terminate strings. return val, points on the next val chr after ins 0x00 example usage: while( (pos = next_arg( optarg, ',')) ){ printf("%s\n",optarg); optarg=pos; } */ char * next_arg(char *src, char needle) { char *nextval; char *p; char *mvp = 0; /* EOS */ if (*src == (char) 0x00) return 0; p = src; /* skip escaped needles */ while ((nextval = strchr(p, needle))) { mvp = nextval - 1; /* found backslashed needle */ if (*mvp == '\\' && (mvp > src)) { /* move string one to the left */ while (*(mvp + 1) != (char) 0x00) { *mvp = *(mvp + 1); mvp++; } *mvp = (char) 0x00; p = nextval; } else { p = nextval + 1; break; } } /* more args available */ if (nextval) { *nextval = (char) 0x00; return ++nextval; } /* no more args after this, jump to EOS */ nextval = src + strlen(src); return nextval; } void toupper_str(char *p) { while (*p) { if ((*p >= 'a') && (*p <= 'z')) *p = toupper((int) *p); p++; } } RD_BOOL str_startswith(const char *s, const char *prefix) { return (strncmp(s, prefix, strlen(prefix)) == 0); } /* Split input into lines, and call linehandler for each line. Incomplete lines are saved in the rest variable, which should initially point to NULL. When linehandler returns False, stop and return False. Otherwise, return True. */ RD_BOOL str_handle_lines(const char *input, char **rest, str_handle_lines_t linehandler, void *data) { char *buf, *p; char *oldrest; size_t inputlen; size_t buflen; size_t restlen = 0; RD_BOOL ret = True; /* Copy data to buffer */ inputlen = strlen(input); if (*rest) restlen = strlen(*rest); buflen = restlen + inputlen + 1; buf = (char *) xmalloc(buflen); buf[0] = '\0'; if (*rest) STRNCPY(buf, *rest, buflen); strncat(buf, input, inputlen); p = buf; while (1) { char *newline = strchr(p, '\n'); if (newline) { *newline = '\0'; if (!linehandler(p, data)) { p = newline + 1; ret = False; break; } p = newline + 1; } else { break; } } /* Save in rest */ oldrest = *rest; restlen = buf + buflen - p; *rest = (char *) xmalloc(restlen); STRNCPY((*rest), p, restlen); xfree(oldrest); xfree(buf); return ret; } /* Execute the program specified by argv. For each line in stdout/stderr output, call linehandler. Returns false on failure. */ RD_BOOL subprocess(char *const argv[], str_handle_lines_t linehandler, void *data) { pid_t child; int fd[2]; int n = 1; char output[256]; char *rest = NULL; if (pipe(fd) < 0) { perror("pipe"); return False; } if ((child = fork()) < 0) { perror("fork"); return False; } /* Child */ if (child == 0) { /* Close read end */ close(fd[0]); /* Redirect stdout and stderr to pipe */ dup2(fd[1], 1); dup2(fd[1], 2); /* Execute */ execvp(argv[0], argv); perror("Error executing child"); _exit(128); } /* Parent. Close write end. */ close(fd[1]); while (n > 0) { n = read(fd[0], output, 255); output[n] = '\0'; str_handle_lines(output, &rest, linehandler, data); } xfree(rest); return True; } /* not all clibs got ltoa */ #define LTOA_BUFSIZE (sizeof(long) * 8 + 1) char * l_to_a(long N, int base) { static char ret[LTOA_BUFSIZE]; char *head = ret, buf[LTOA_BUFSIZE], *tail = buf + sizeof(buf); register int divrem; if (base < 36 || 2 > base) base = 10; if (N < 0) { *head++ = '-'; N = -N; } tail = buf + sizeof(buf); *--tail = 0; do { divrem = N % base; *--tail = (divrem <= 9) ? divrem + '0' : divrem + 'a' - 10; N /= base; } while (N); strcpy(head, tail); return ret; } int load_licence(unsigned char **data) { uint8 ho[20], hi[16]; char *home, path[PATH_MAX], hash[41]; struct stat st; int fd, length; home = getenv("HOME"); if (home == NULL) return -1; memset(hi, 0, sizeof(hi)); snprintf((char *) hi, 16, "%s", g_hostname); sec_hash_sha1_16(ho, hi, g_static_rdesktop_salt_16); sec_hash_to_string(hash, sizeof(hash), ho, sizeof(ho)); snprintf(path, PATH_MAX, "%s" RDESKTOP_LICENSE_STORE "/%s.cal", home, hash); path[sizeof(path) - 1] = '\0'; fd = open(path, O_RDONLY); if (fd == -1) { /* fallback to try reading old license file */ snprintf(path, PATH_MAX, "%s/.rdesktop/license.%s", home, g_hostname); path[sizeof(path) - 1] = '\0'; if ((fd = open(path, O_RDONLY)) == -1) return -1; } if (fstat(fd, &st)) { close(fd); return -1; } *data = (uint8 *) xmalloc(st.st_size); length = read(fd, *data, st.st_size); close(fd); return length; } void save_licence(unsigned char *data, int length) { uint8 ho[20], hi[16]; char *home, path[PATH_MAX + 5], tmppath[PATH_MAX + 10], hash[41]; int fd; home = getenv("HOME"); if (home == NULL) return; snprintf(path, PATH_MAX, "%s" RDESKTOP_LICENSE_STORE, home); path[sizeof(path) - 1] = '\0'; if (utils_mkdir_p(path, 0700) == -1) { perror(path); return; } memset(hi, 0, sizeof(hi)); snprintf((char *) hi, 16, "%s", g_hostname); sec_hash_sha1_16(ho, hi, g_static_rdesktop_salt_16); sec_hash_to_string(hash, sizeof(hash), ho, sizeof(ho)); /* write licence to {sha1}.cal.new, then atomically rename to {sha1}.cal */ snprintf(path, sizeof(path), "%s" RDESKTOP_LICENSE_STORE "/%s.cal", home, hash); path[sizeof(path) - 1] = '\0'; snprintf(tmppath, sizeof(tmppath), "%s.new", path); path[sizeof(path) - 1] = '\0'; fd = open(tmppath, O_WRONLY | O_CREAT | O_TRUNC, 0600); if (fd == -1) { perror(tmppath); return; } if (write(fd, data, length) != length) { perror(tmppath); unlink(tmppath); } else if (rename(tmppath, path) == -1) { perror(path); unlink(tmppath); } close(fd); } /* create rdesktop ui */ void rd_create_ui() { /* only create a window if we dont have one intialized */ if (!ui_have_window()) { if (!ui_create_window()) exit(EX_OSERR); } } /* Create the bitmap cache directory */ RD_BOOL rd_pstcache_mkdir(void) { char *home; char bmpcache_dir[256]; home = getenv("HOME"); if (home == NULL) return False; #ifdef VBOX snprintf(bmpcache_dir, sizeof(bmpcache_dir), "%s/%s", home, ".rdesktop"); #else sprintf(bmpcache_dir, "%s/%s", home, ".rdesktop"); #endif if ((mkdir(bmpcache_dir, S_IRWXU) == -1) && errno != EEXIST) { perror(bmpcache_dir); return False; } #ifdef VBOX snprintf(bmpcache_dir, sizeof(bmpcache_dir), "%s/%s", home, ".rdesktop/cache"); #else sprintf(bmpcache_dir, "%s/%s", home, ".rdesktop/cache"); #endif if ((mkdir(bmpcache_dir, S_IRWXU) == -1) && errno != EEXIST) { perror(bmpcache_dir); return False; } return True; } /* open a file in the .rdesktop directory */ int rd_open_file(char *filename) { char *home; char fn[256]; int fd; home = getenv("HOME"); if (home == NULL) return -1; #ifdef VBOX snprintf(fn, sizeof(fn), "%s/.rdesktop/%s", home, filename); #else sprintf(fn, "%s/.rdesktop/%s", home, filename); #endif fd = open(fn, O_RDWR | O_CREAT, S_IRUSR | S_IWUSR); if (fd == -1) perror(fn); return fd; } /* close file */ void rd_close_file(int fd) { close(fd); } /* read from file*/ int rd_read_file(int fd, void *ptr, int len) { return read(fd, ptr, len); } /* write to file */ int rd_write_file(int fd, void *ptr, int len) { return write(fd, ptr, len); } /* move file pointer */ int rd_lseek_file(int fd, int offset) { return lseek(fd, offset, SEEK_SET); } /* do a write lock on a file */ RD_BOOL rd_lock_file(int fd, int start, int len) { struct flock lock; lock.l_type = F_WRLCK; lock.l_whence = SEEK_SET; lock.l_start = start; lock.l_len = len; if (fcntl(fd, F_SETLK, &lock) == -1) return False; return True; }