You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
5495 lines
158 KiB
5495 lines
158 KiB
diff -Naur JavaViewer.orig/ButtonPanel.java JavaViewer/ButtonPanel.java
|
|
--- JavaViewer.orig/ButtonPanel.java 2004-12-12 20:51:02.000000000 -0500
|
|
+++ JavaViewer/ButtonPanel.java 2007-05-31 15:40:45.000000000 -0400
|
|
@@ -43,30 +43,36 @@
|
|
viewer = v;
|
|
|
|
setLayout(new FlowLayout(FlowLayout.LEFT, 0, 0));
|
|
- disconnectButton = new Button("Disconnect");
|
|
+ if (v.ftpOnly) {
|
|
+ disconnectButton = new Button("Quit");
|
|
+ } else {
|
|
+ disconnectButton = new Button("Close");
|
|
+ }
|
|
disconnectButton.setEnabled(false);
|
|
add(disconnectButton);
|
|
disconnectButton.addActionListener(this);
|
|
- optionsButton = new Button("Options");
|
|
- add(optionsButton);
|
|
- optionsButton.addActionListener(this);
|
|
- clipboardButton = new Button("Clipboard");
|
|
- clipboardButton.setEnabled(false);
|
|
- add(clipboardButton);
|
|
- clipboardButton.addActionListener(this);
|
|
- if (viewer.rec != null) {
|
|
- recordButton = new Button("Record");
|
|
- add(recordButton);
|
|
- recordButton.addActionListener(this);
|
|
- }
|
|
- ctrlAltDelButton = new Button("Send Ctrl-Alt-Del");
|
|
- ctrlAltDelButton.setEnabled(false);
|
|
- add(ctrlAltDelButton);
|
|
- ctrlAltDelButton.addActionListener(this);
|
|
- refreshButton = new Button("Refresh");
|
|
- refreshButton.setEnabled(false);
|
|
- add(refreshButton);
|
|
- refreshButton.addActionListener(this);
|
|
+ if (!v.ftpOnly) {
|
|
+ optionsButton = new Button("Options");
|
|
+ add(optionsButton);
|
|
+ optionsButton.addActionListener(this);
|
|
+ clipboardButton = new Button("Clipboard");
|
|
+ clipboardButton.setEnabled(false);
|
|
+ add(clipboardButton);
|
|
+ clipboardButton.addActionListener(this);
|
|
+ if (viewer.rec != null) {
|
|
+ recordButton = new Button("Record");
|
|
+ add(recordButton);
|
|
+ recordButton.addActionListener(this);
|
|
+ }
|
|
+ ctrlAltDelButton = new Button("Send Ctrl-Alt-Del");
|
|
+ ctrlAltDelButton.setEnabled(false);
|
|
+ add(ctrlAltDelButton);
|
|
+ ctrlAltDelButton.addActionListener(this);
|
|
+ refreshButton = new Button("Refresh");
|
|
+ refreshButton.setEnabled(false);
|
|
+ add(refreshButton);
|
|
+ refreshButton.addActionListener(this);
|
|
+ }
|
|
ftpButton = new Button("File Transfer");
|
|
ftpButton.setEnabled(false);
|
|
add(ftpButton);
|
|
@@ -79,9 +85,10 @@
|
|
|
|
public void enableButtons() {
|
|
disconnectButton.setEnabled(true);
|
|
+ ftpButton.setEnabled(true);
|
|
+ if (viewer.ftpOnly) {return;}
|
|
clipboardButton.setEnabled(true);
|
|
refreshButton.setEnabled(true);
|
|
- ftpButton.setEnabled(true);
|
|
}
|
|
|
|
//
|
|
@@ -89,6 +96,9 @@
|
|
//
|
|
|
|
public void disableButtonsOnDisconnect() {
|
|
+ ftpButton.setEnabled(false);
|
|
+ if (viewer.ftpOnly) {return;}
|
|
+
|
|
remove(disconnectButton);
|
|
disconnectButton = new Button("Hide desktop");
|
|
disconnectButton.setEnabled(true);
|
|
@@ -99,7 +109,6 @@
|
|
clipboardButton.setEnabled(false);
|
|
ctrlAltDelButton.setEnabled(false);
|
|
refreshButton.setEnabled(false);
|
|
- ftpButton.setEnabled(false);
|
|
|
|
validate();
|
|
}
|
|
@@ -110,6 +119,7 @@
|
|
//
|
|
|
|
public void enableRemoteAccessControls(boolean enable) {
|
|
+ if (viewer.ftpOnly) {return;}
|
|
ctrlAltDelButton.setEnabled(enable);
|
|
}
|
|
|
|
@@ -163,9 +173,19 @@
|
|
}
|
|
else if (evt.getSource() == ftpButton)
|
|
{
|
|
- viewer.ftp.setVisible(!viewer.ftp.isVisible());
|
|
+// begin runge/x11vnc
|
|
+ if (viewer.ftpOnly) {
|
|
+ viewer.vncFrame.setVisible(false);
|
|
+ }
|
|
+ viewer.ftp.setSavedLocations();
|
|
+ if (viewer.ftp.isVisible()) {
|
|
+ viewer.ftp.doClose();
|
|
+ } else {
|
|
+ viewer.ftp.doOpen();
|
|
+ }
|
|
+// end runge/x11vnc
|
|
viewer.rfb.readServerDriveList();
|
|
-
|
|
+
|
|
}
|
|
}
|
|
}
|
|
diff -Naur JavaViewer.orig/FTPFrame.java JavaViewer/FTPFrame.java
|
|
--- JavaViewer.orig/FTPFrame.java 2005-03-15 23:53:14.000000000 -0500
|
|
+++ JavaViewer/FTPFrame.java 2009-01-13 09:48:30.000000000 -0500
|
|
@@ -24,8 +24,17 @@
|
|
import java.io.*;
|
|
import java.util.ArrayList;
|
|
import java.util.Vector;
|
|
+import java.util.Date;
|
|
import javax.swing.*;
|
|
|
|
+import java.nio.ByteBuffer;
|
|
+import java.nio.CharBuffer;
|
|
+import java.nio.charset.*;
|
|
+
|
|
+// begin runge/x11vnc
|
|
+import java.util.Arrays;
|
|
+// end runge/x11vnc
|
|
+
|
|
|
|
/*
|
|
* Created on Feb 25, 2004
|
|
@@ -74,12 +83,31 @@
|
|
public javax.swing.JTextField connectionStatus = null;
|
|
public boolean updateDriveList;
|
|
private Vector remoteList = null;
|
|
+ private Vector remoteListInfo = null;
|
|
private Vector localList = null;
|
|
+ private Vector localListInfo = null;
|
|
private File currentLocalDirectory = null; // Holds the current local Directory
|
|
private File currentRemoteDirectory = null; // Holds the current remote Directory
|
|
private File localSelection = null; // Holds the currently selected local file
|
|
private String remoteSelection = null; // Holds the currently selected remote file
|
|
public String selectedTable = null;
|
|
+
|
|
+// begin runge/x11vnc
|
|
+ private javax.swing.JButton viewButton = null;
|
|
+ private javax.swing.JButton refreshButton = null;
|
|
+ public File saveLocalDirectory = null;
|
|
+ public long saveLocalDirectoryTime = 0;
|
|
+ public int saveLocalDirectoryCount = 0;
|
|
+ public String saveRemoteDirectory = null;
|
|
+ public long saveRemoteDirectoryTime = 0;
|
|
+ public int saveRemoteDirectoryCount = 0;
|
|
+ private boolean localCurrentIsDir = true;
|
|
+ private int lastRemoteIndex = -1;
|
|
+ private int lastLocalIndex = -1;
|
|
+ private boolean doingShortcutDir = false;
|
|
+ private boolean gotShortcutDir = false;
|
|
+ private boolean ignore_events = false;
|
|
+// end runge/x11vnc
|
|
|
|
// sf@2004 - Separate directories and files for better lisibility
|
|
private ArrayList DirsList;
|
|
@@ -125,11 +153,61 @@
|
|
|
|
void refreshRemoteLocation()
|
|
{
|
|
+
|
|
+//System.out.println("refreshRemoteLocation1");
|
|
remoteList.clear();
|
|
+ remoteListInfo.clear();
|
|
remoteFileTable.setListData(remoteList);
|
|
+System.out.println("refreshRemoteLocation '" + remoteLocation.getText() + "'"); // runge/x11vnc
|
|
viewer.rfb.readServerDirectory(remoteLocation.getText());
|
|
}
|
|
|
|
+// begin runge/x11vnc
|
|
+ public void setSavedLocations() {
|
|
+ saveLocalDirectory = currentLocalDirectory;
|
|
+ saveLocalDirectoryTime = System.currentTimeMillis();
|
|
+ saveLocalDirectoryCount = 0;
|
|
+
|
|
+ if (remoteLocation != null) {
|
|
+ saveRemoteDirectory = remoteLocation.getText();
|
|
+System.out.println("RemoteSave '" + saveRemoteDirectory + "'");
|
|
+ }
|
|
+ saveRemoteDirectoryTime = System.currentTimeMillis();
|
|
+ saveRemoteDirectoryCount = 0;
|
|
+ }
|
|
+
|
|
+ private File saveLocalHack(File dir) {
|
|
+ saveLocalDirectoryCount++;
|
|
+//System.out.println("L " + saveLocalDirectoryCount + " dt: " + (System.currentTimeMillis() - saveLocalDirectoryTime) + " - " + saveLocalDirectory);
|
|
+ if (System.currentTimeMillis() > saveLocalDirectoryTime + 2000 || saveLocalDirectoryCount > 2) {
|
|
+ saveLocalDirectory = null;
|
|
+ }
|
|
+ if (saveLocalDirectory != null) {
|
|
+ currentLocalDirectory = saveLocalDirectory;
|
|
+ localLocation.setText(saveLocalDirectory.toString());
|
|
+ return saveLocalDirectory;
|
|
+ } else {
|
|
+ return dir;
|
|
+ }
|
|
+ }
|
|
+
|
|
+ private String saveRemoteHack(String indrive) {
|
|
+ saveRemoteDirectoryCount++;
|
|
+//System.out.println("R " + saveRemoteDirectoryCount + " - " + saveRemoteDirectory);
|
|
+ if (saveRemoteDirectory != null && saveRemoteDirectoryCount > 1) {
|
|
+ saveRemoteDirectory = null;
|
|
+ }
|
|
+ if (saveRemoteDirectory != null) {
|
|
+ if (! saveRemoteDirectory.equals("")) {
|
|
+System.out.println("saveRemoteHack setText + refreshRemoteLocation '" + saveRemoteDirectory + "'");
|
|
+ return saveRemoteDirectory;
|
|
+ }
|
|
+ }
|
|
+ return indrive;
|
|
+ }
|
|
+// end runge/x11vnc
|
|
+
|
|
+
|
|
/*
|
|
* Prints the list of drives on the remote directory and returns a String[].
|
|
* str takes as string like A:fC:lD:lE:lF:lG:cH:c
|
|
@@ -143,6 +221,9 @@
|
|
int size = str.length();
|
|
String driveType = null;
|
|
String[] drive = new String[str.length() / 3];
|
|
+ int idx = 0, C_drive = -1, O_drive = -1;
|
|
+
|
|
+System.out.println("ComboBox: Str '" + str + "'");
|
|
|
|
// Loop through the string to create a String[]
|
|
for (int i = 0; i < size; i = i + 3) {
|
|
@@ -150,26 +231,68 @@
|
|
driveType = str.substring(i + 2, i + 3);
|
|
if (driveType.compareTo("f") == 0)
|
|
drive[i / 3] += "\\ Floppy";
|
|
- if (driveType.compareTo("l") == 0)
|
|
+ if (driveType.compareTo("l") == 0) {
|
|
drive[i / 3] += "\\ Local Disk";
|
|
+ if (drive[i/3].substring(0,1).toUpperCase().equals("C")) {
|
|
+ C_drive = idx;
|
|
+ } else if (O_drive < 0) {
|
|
+ O_drive = idx;
|
|
+ }
|
|
+ }
|
|
if (driveType.compareTo("c") == 0)
|
|
drive[i / 3] += "\\ CD-ROM";
|
|
if (driveType.compareTo("n") == 0)
|
|
drive[i / 3] += "\\ Network";
|
|
|
|
remoteDrivesComboBox.addItem(drive[i / 3]);
|
|
+System.out.println("ComboBox: Add " + idx + " '" + drive[i/3] + "'");
|
|
+ idx++;
|
|
+ }
|
|
+
|
|
+ // runge
|
|
+ if (viewer.ftpDropDown != null) {
|
|
+ String[] dd = viewer.ftpDropDown.split("\\.");
|
|
+ for (int i=0; i < dd.length; i++) {
|
|
+ if (!dd[i].equals("")) {
|
|
+ String s = dd[i];
|
|
+ if (s.startsWith("TOP_")) {
|
|
+ s = s.substring(4);
|
|
+ remoteDrivesComboBox.insertItemAt(" [" + s + "]", 0);
|
|
+ } else {
|
|
+ remoteDrivesComboBox.addItem(" [" + s + "]");
|
|
+ }
|
|
+ }
|
|
+ }
|
|
+ } else {
|
|
+ remoteDrivesComboBox.addItem(" [My Documents]");
|
|
+ remoteDrivesComboBox.addItem(" [Desktop]");
|
|
+ remoteDrivesComboBox.addItem(" [Home]");
|
|
}
|
|
+
|
|
//sf@ - Select Drive C:as default if possible
|
|
boolean bFound = false;
|
|
- for(int i = 0; i < remoteDrivesComboBox.getItemCount() ; i++)
|
|
- {
|
|
- if(remoteDrivesComboBox.getItemAt(i).toString().substring(0,1).toUpperCase().equals("C"))
|
|
- {
|
|
- remoteDrivesComboBox.setSelectedIndex(i);
|
|
+
|
|
+ if (false) {
|
|
+ for(int i = 0; i < remoteDrivesComboBox.getItemCount() ; i++) {
|
|
+ if(remoteDrivesComboBox.getItemAt(i).toString().substring(0,1).toUpperCase().equals("C")) {
|
|
+ remoteDrivesComboBox.setSelectedIndex(i);
|
|
+ bFound = true;
|
|
+ }
|
|
+ }
|
|
+ } else {
|
|
+ if (C_drive >= 0) {
|
|
+ remoteDrivesComboBox.setSelectedIndex(C_drive);
|
|
+ bFound = true;
|
|
+System.out.println("ComboBox: C_drive index: " + C_drive);
|
|
+ } else if (O_drive >= 0) {
|
|
+ remoteDrivesComboBox.setSelectedIndex(O_drive);
|
|
bFound = true;
|
|
+System.out.println("ComboBox: Other_drive index: " + O_drive);
|
|
}
|
|
}
|
|
+
|
|
if (!bFound) remoteDrivesComboBox.setSelectedIndex(0);
|
|
+
|
|
updateDriveList = false;
|
|
return drive;
|
|
}
|
|
@@ -185,6 +308,8 @@
|
|
stopButton.setVisible(true);
|
|
stopButton.setEnabled(true);
|
|
receiveButton.setEnabled(false);
|
|
+ viewButton.setEnabled(false); // runge/x11vnc
|
|
+ refreshButton.setEnabled(false);
|
|
remoteTopButton.setEnabled(false);
|
|
sendButton.setEnabled(false);
|
|
remoteFileTable.setEnabled(false);
|
|
@@ -207,6 +332,8 @@
|
|
stopButton.setVisible(false);
|
|
stopButton.setEnabled(false);
|
|
receiveButton.setEnabled(true);
|
|
+ viewButton.setEnabled(true); // runge/x11vnc
|
|
+ refreshButton.setEnabled(true);
|
|
remoteTopButton.setEnabled(true);
|
|
sendButton.setEnabled(true);
|
|
remoteFileTable.setEnabled(true);
|
|
@@ -221,10 +348,11 @@
|
|
/*
|
|
* Print Directory prints out all the contents of a directory
|
|
*/
|
|
- void printDirectory(ArrayList a) {
|
|
+ void printDirectory(ArrayList a, ArrayList b) {
|
|
|
|
for (int i = 0; i < a.size(); i++) {
|
|
remoteList.addElement(a.get(i));
|
|
+ remoteListInfo.addElement(b.get(i));
|
|
}
|
|
remoteFileTable.setListData(remoteList);
|
|
}
|
|
@@ -235,10 +363,12 @@
|
|
* @return void
|
|
*/
|
|
private void initialize() {
|
|
+ ignore_events = true;
|
|
this.setSize(794, 500);
|
|
this.setContentPane(getJContentPane());
|
|
+ ignore_events = false;
|
|
updateDriveList = true;
|
|
- }
|
|
+ }
|
|
/**
|
|
* This method initializes jContentPane. This is the main content pane
|
|
*
|
|
@@ -253,6 +383,33 @@
|
|
jContentPane.add(getRemotePanel(), java.awt.BorderLayout.EAST);
|
|
jContentPane.add(getLocalPanel(), java.awt.BorderLayout.WEST);
|
|
jContentPane.add(getButtonPanel(), java.awt.BorderLayout.CENTER);
|
|
+
|
|
+ KeyStroke stroke = KeyStroke.getKeyStroke(KeyEvent.VK_ESCAPE, 0);
|
|
+ AbstractAction escapeAction = new AbstractAction() {
|
|
+ public void actionPerformed(ActionEvent actionEvent) {
|
|
+ System.out.println("Escape Pressed");
|
|
+ if (viewer.ftpOnly) {
|
|
+ System.out.println("exiting...");
|
|
+ System.exit(0);
|
|
+ } else {
|
|
+ doClose();
|
|
+ }
|
|
+ }
|
|
+ };
|
|
+ jContentPane.getInputMap(JComponent.WHEN_ANCESTOR_OF_FOCUSED_COMPONENT).put(stroke, "escapeAction");
|
|
+ jContentPane.getInputMap().put(stroke, "escapeAction");
|
|
+ jContentPane.getActionMap().put("escapeAction", escapeAction);
|
|
+
|
|
+ stroke = KeyStroke.getKeyStroke(KeyEvent.VK_R, InputEvent.CTRL_MASK);
|
|
+ AbstractAction resetAction = new AbstractAction() {
|
|
+ public void actionPerformed(ActionEvent actionEvent) {
|
|
+ System.out.println("Ctrl-R Pressed");
|
|
+ doReset();
|
|
+ }
|
|
+ };
|
|
+ jContentPane.getInputMap(JComponent.WHEN_ANCESTOR_OF_FOCUSED_COMPONENT).put(stroke, "resetAction");
|
|
+ jContentPane.getInputMap().put(stroke, "resetAction");
|
|
+ jContentPane.getActionMap().put("resetAction", resetAction);
|
|
}
|
|
return jContentPane;
|
|
}
|
|
@@ -270,6 +427,7 @@
|
|
topPanelLocal.add(getLocalMachineLabel(), java.awt.BorderLayout.CENTER);
|
|
topPanelLocal.add(getLocalTopButton(), java.awt.BorderLayout.EAST);
|
|
topPanelLocal.setBackground(java.awt.Color.lightGray);
|
|
+//System.out.println("getTopPanelLocal");
|
|
}
|
|
return topPanelLocal;
|
|
}
|
|
@@ -288,6 +446,7 @@
|
|
topPanelRemote.add(getRemoteMachineLabel(), java.awt.BorderLayout.CENTER);
|
|
topPanelRemote.add(getRemoteTopButton(), java.awt.BorderLayout.EAST);
|
|
topPanelRemote.setBackground(java.awt.Color.lightGray);
|
|
+//System.out.println("getTopPanelRemote");
|
|
}
|
|
return topPanelRemote;
|
|
}
|
|
@@ -301,6 +460,7 @@
|
|
if (topPanelCenter == null) {
|
|
topPanelCenter = new javax.swing.JPanel();
|
|
topPanelCenter.add(getDummyButton(), null);
|
|
+//System.out.println("getTopPanelCenter");
|
|
}
|
|
return topPanelCenter;
|
|
}
|
|
@@ -328,6 +488,7 @@
|
|
topPanel.add(getRemoteTopButton(), null);
|
|
topPanel.setBackground(java.awt.Color.lightGray);
|
|
*/
|
|
+//System.out.println("getTopPanel");
|
|
}
|
|
return topPanel;
|
|
}
|
|
@@ -348,6 +509,7 @@
|
|
statusPanel.add(getJProgressBar(), null);
|
|
statusPanel.add(getConnectionStatus(), null);
|
|
statusPanel.setBackground(java.awt.Color.lightGray);
|
|
+//System.out.println("getStatusPanel");
|
|
|
|
}
|
|
return statusPanel;
|
|
@@ -368,6 +530,7 @@
|
|
remotePanel.add(getRemoteScrollPane(), null);
|
|
remotePanel.add(getRemoteStatus(), null);
|
|
remotePanel.setBackground(java.awt.Color.lightGray);
|
|
+//System.out.println("getRemotePanel");
|
|
}
|
|
return remotePanel;
|
|
}
|
|
@@ -390,6 +553,7 @@
|
|
localPanel.setComponentOrientation(
|
|
java.awt.ComponentOrientation.UNKNOWN);
|
|
localPanel.setName("localPanel");
|
|
+//System.out.println("getLocalPanel");
|
|
}
|
|
return localPanel;
|
|
}
|
|
@@ -405,12 +569,15 @@
|
|
buttonPanel = new javax.swing.JPanel();
|
|
buttonPanel.setLayout(null);
|
|
buttonPanel.add(getReceiveButton(), null);
|
|
+ buttonPanel.add(getRefreshButton(), null); // runge/x11vnc
|
|
+ buttonPanel.add(getViewButton(), null); // runge/x11vnc
|
|
buttonPanel.add(getNewFolderButton(), null);
|
|
buttonPanel.add(getCloseButton(), null);
|
|
buttonPanel.add(getDeleteButton(), null);
|
|
buttonPanel.add(getSendButton(), null);
|
|
buttonPanel.add(getStopButton(), null);
|
|
buttonPanel.setBackground(java.awt.Color.lightGray);
|
|
+//System.out.println("getButtonPanel");
|
|
}
|
|
return buttonPanel;
|
|
}
|
|
@@ -422,10 +589,11 @@
|
|
private javax.swing.JButton getSendButton() {
|
|
if (sendButton == null) {
|
|
sendButton = new javax.swing.JButton();
|
|
- sendButton.setBounds(20, 30, 97, 25);
|
|
+ sendButton.setBounds(15, 30, 107, 25); // runge/x11vnc
|
|
sendButton.setText("Send >>");
|
|
sendButton.setName("sendButton");
|
|
sendButton.addActionListener(this);
|
|
+//System.out.println("getSendButton");
|
|
|
|
}
|
|
return sendButton;
|
|
@@ -438,7 +606,7 @@
|
|
private javax.swing.JButton getReceiveButton() {
|
|
if (receiveButton == null) {
|
|
receiveButton = new javax.swing.JButton();
|
|
- receiveButton.setBounds(20, 60, 97, 25);
|
|
+ receiveButton.setBounds(15, 60, 107, 25); // runge/x11vnc
|
|
receiveButton.setText("<< Receive");
|
|
receiveButton.setName("receiveButton");
|
|
receiveButton.addActionListener(this);
|
|
@@ -453,7 +621,7 @@
|
|
private javax.swing.JButton getDeleteButton() {
|
|
if (deleteButton == null) {
|
|
deleteButton = new javax.swing.JButton();
|
|
- deleteButton.setBounds(20, 110, 97, 25);
|
|
+ deleteButton.setBounds(15, 110, 107, 25); // runge/x11vnc
|
|
deleteButton.setText("Delete File");
|
|
deleteButton.setName("deleteButton");
|
|
deleteButton.addActionListener(this);
|
|
@@ -468,7 +636,7 @@
|
|
private javax.swing.JButton getNewFolderButton() {
|
|
if (newFolderButton == null) {
|
|
newFolderButton = new javax.swing.JButton();
|
|
- newFolderButton.setBounds(20, 140, 97, 25);
|
|
+ newFolderButton.setBounds(15, 140, 107, 25); // runge/x11vnc
|
|
newFolderButton.setText("New Folder");
|
|
newFolderButton.setName("newFolderButton");
|
|
newFolderButton.addActionListener(this);
|
|
@@ -476,6 +644,39 @@
|
|
return newFolderButton;
|
|
}
|
|
|
|
+// begin runge/x11vnc
|
|
+ /**
|
|
+ * This method initializes refreshButton
|
|
+ *
|
|
+ * @return javax.swing.JButton
|
|
+ */
|
|
+ private javax.swing.JButton getRefreshButton() {
|
|
+ if (refreshButton == null) {
|
|
+ refreshButton = new javax.swing.JButton();
|
|
+ refreshButton.setBounds(15, 170, 107, 25);
|
|
+ refreshButton.setText("Refresh");
|
|
+ refreshButton.setName("refreshButton");
|
|
+ refreshButton.addActionListener(this);
|
|
+ }
|
|
+ return refreshButton;
|
|
+ }
|
|
+ /**
|
|
+ * This method initializes viewButton
|
|
+ *
|
|
+ * @return javax.swing.JButton
|
|
+ */
|
|
+ private javax.swing.JButton getViewButton() {
|
|
+ if (viewButton == null) {
|
|
+ viewButton = new javax.swing.JButton();
|
|
+ viewButton.setBounds(15, 200, 107, 25);
|
|
+ viewButton.setText("View File");
|
|
+ viewButton.setName("viewButton");
|
|
+ viewButton.addActionListener(this);
|
|
+ }
|
|
+ return viewButton;
|
|
+ }
|
|
+// end runge/x11vnc
|
|
+
|
|
/**
|
|
* This method initializes stopButton
|
|
*
|
|
@@ -486,7 +687,7 @@
|
|
if (stopButton == null)
|
|
{
|
|
stopButton = new javax.swing.JButton();
|
|
- stopButton.setBounds(20, 200, 97, 25);
|
|
+ stopButton.setBounds(15, 230, 107, 25); // runge/x11vnc
|
|
stopButton.setText("Stop");
|
|
stopButton.setName("stopButton");
|
|
stopButton.addActionListener(this);
|
|
@@ -503,8 +704,12 @@
|
|
private javax.swing.JButton getCloseButton() {
|
|
if (closeButton == null) {
|
|
closeButton = new javax.swing.JButton();
|
|
- closeButton.setBounds(20, 325, 97, 25);
|
|
- closeButton.setText("Close");
|
|
+ closeButton.setBounds(15, 325, 107, 25); // runge/x11vnc
|
|
+ if (viewer.ftpOnly) {
|
|
+ closeButton.setText("Quit");
|
|
+ } else {
|
|
+ closeButton.setText("Close");
|
|
+ }
|
|
closeButton.setName("closeButton");
|
|
closeButton.addActionListener(this);
|
|
}
|
|
@@ -551,6 +756,7 @@
|
|
//Select the second entry (e.g. C:\)
|
|
// localDrivesComboBox.setSelectedIndex(1);
|
|
localDrivesComboBox.addActionListener(this);
|
|
+//System.out.println("getLocalDrivesComboBox");
|
|
}
|
|
updateDriveList = false;
|
|
return localDrivesComboBox;
|
|
@@ -567,6 +773,7 @@
|
|
remoteDrivesComboBox.setFont(
|
|
new java.awt.Font("Dialog", java.awt.Font.PLAIN, 10));
|
|
remoteDrivesComboBox.addActionListener(this);
|
|
+//System.out.println("getRemoteDrivesComboBox");
|
|
|
|
}
|
|
return remoteDrivesComboBox;
|
|
@@ -587,6 +794,7 @@
|
|
localMachineLabel.setFont(
|
|
new java.awt.Font("Dialog", java.awt.Font.BOLD, 11));
|
|
localMachineLabel.setEditable(false);
|
|
+//System.out.println("getLocalMachineLabel");
|
|
}
|
|
return localMachineLabel;
|
|
}
|
|
@@ -622,6 +830,7 @@
|
|
localTopButton.setFont(
|
|
new java.awt.Font("Dialog", java.awt.Font.BOLD, 10));
|
|
localTopButton.addActionListener(this);
|
|
+//System.out.println("getLocalTopButton");
|
|
}
|
|
return localTopButton;
|
|
}
|
|
@@ -638,6 +847,7 @@
|
|
remoteTopButton.setFont(
|
|
new java.awt.Font("Dialog", java.awt.Font.BOLD, 10));
|
|
remoteTopButton.addActionListener(this);
|
|
+//System.out.println("getRemoteTopButton");
|
|
}
|
|
return remoteTopButton;
|
|
}
|
|
@@ -650,9 +860,24 @@
|
|
private javax.swing.JList getLocalFileTable() {
|
|
if (localFileTable == null) {
|
|
localList = new Vector(0);
|
|
+ localListInfo = new Vector(0);
|
|
localFileTable = new JList(localList);
|
|
+ MouseMotionListener mlisten = new MouseMotionAdapter() {
|
|
+ public void mouseMoved(MouseEvent e) {
|
|
+ int index = localFileTable.locationToIndex(e.getPoint());
|
|
+ if (index == lastLocalIndex) {
|
|
+ return;
|
|
+ } else if (index < 0) {
|
|
+ return;
|
|
+ }
|
|
+ lastLocalIndex = index;
|
|
+ connectionStatus.setText((String) localListInfo.get(index));
|
|
+ }
|
|
+ };
|
|
localFileTable.addMouseListener(this);
|
|
+ localFileTable.addMouseMotionListener(mlisten);
|
|
localFileTable.setSelectionMode(ListSelectionModel.SINGLE_SELECTION);
|
|
+//System.out.println("getLocalFileTable");
|
|
}
|
|
return localFileTable;
|
|
}
|
|
@@ -669,6 +894,7 @@
|
|
localScrollPane.setFont(
|
|
new java.awt.Font("Dialog", java.awt.Font.PLAIN, 10));
|
|
localScrollPane.setName("localFileList");
|
|
+//System.out.println("getLocalScrollPane");
|
|
}
|
|
return localScrollPane;
|
|
}
|
|
@@ -680,10 +906,25 @@
|
|
private javax.swing.JList getRemoteFileTable() {
|
|
if (remoteFileTable == null) {
|
|
remoteList = new Vector(0);
|
|
+ remoteListInfo = new Vector(0);
|
|
remoteFileTable = new JList(remoteList);
|
|
+ MouseMotionListener mlisten = new MouseMotionAdapter() {
|
|
+ public void mouseMoved(MouseEvent e) {
|
|
+ int index = remoteFileTable.locationToIndex(e.getPoint());
|
|
+ if (index == lastRemoteIndex) {
|
|
+ return;
|
|
+ } else if (index < 0) {
|
|
+ return;
|
|
+ }
|
|
+ lastRemoteIndex = index;
|
|
+ connectionStatus.setText((String) remoteListInfo.get(index));
|
|
+ }
|
|
+ };
|
|
remoteFileTable.addMouseListener(this);
|
|
+ remoteFileTable.addMouseMotionListener(mlisten);
|
|
remoteFileTable.setSelectedValue("C:\\", false);
|
|
remoteFileTable.setSelectionMode(ListSelectionModel.SINGLE_SELECTION);
|
|
+//System.out.println("getRemoteFileTable");
|
|
|
|
}
|
|
return remoteFileTable;
|
|
@@ -698,6 +939,7 @@
|
|
remoteScrollPane = new javax.swing.JScrollPane();
|
|
remoteScrollPane.setViewportView(getRemoteFileTable());
|
|
remoteScrollPane.setPreferredSize(new java.awt.Dimension(325, 418));
|
|
+//System.out.println("getRemoteScrollPane");
|
|
}
|
|
return remoteScrollPane;
|
|
}
|
|
@@ -716,6 +958,7 @@
|
|
remoteLocation.setBackground(new Color(255,255,238));
|
|
remoteLocation.setFont(
|
|
new java.awt.Font("Dialog", java.awt.Font.PLAIN, 10));
|
|
+//System.out.println("getRemoteLocation");
|
|
}
|
|
return remoteLocation;
|
|
}
|
|
@@ -732,6 +975,7 @@
|
|
localLocation.setBackground( new Color(255,255,238));
|
|
localLocation.setFont(
|
|
new java.awt.Font("Dialog", java.awt.Font.PLAIN, 10));
|
|
+//System.out.println("getLocalLocation");
|
|
}
|
|
return localLocation;
|
|
}
|
|
@@ -748,6 +992,7 @@
|
|
localStatus.setFont(
|
|
new java.awt.Font("Dialog", java.awt.Font.PLAIN, 10));
|
|
localStatus.setEditable(false);
|
|
+//System.out.println("getLocalStatus");
|
|
}
|
|
return localStatus;
|
|
}
|
|
@@ -764,6 +1009,7 @@
|
|
remoteStatus.setFont(
|
|
new java.awt.Font("Dialog", java.awt.Font.PLAIN, 10));
|
|
remoteStatus.setEditable(false);
|
|
+//System.out.println("getRemoteStatus");
|
|
}
|
|
return remoteStatus;
|
|
}
|
|
@@ -777,9 +1023,10 @@
|
|
historyComboBox = new javax.swing.JComboBox();
|
|
historyComboBox.setFont(
|
|
new java.awt.Font("Dialog", java.awt.Font.BOLD, 10));
|
|
- historyComboBox.insertItemAt(new String("Pulldown to view history ..."),0);
|
|
+ historyComboBox.insertItemAt(new String("Pulldown to view history; Press Escape to Close/Quit; Press Ctrl-R to Reset Panel."),0);
|
|
historyComboBox.setSelectedIndex(0);
|
|
historyComboBox.addActionListener(this);
|
|
+//System.out.println("getHistoryComboBox");
|
|
}
|
|
return historyComboBox;
|
|
}
|
|
@@ -791,6 +1038,7 @@
|
|
private javax.swing.JProgressBar getJProgressBar() {
|
|
if (jProgressBar == null) {
|
|
jProgressBar = new javax.swing.JProgressBar();
|
|
+//System.out.println("getJProgressBar");
|
|
}
|
|
return jProgressBar;
|
|
}
|
|
@@ -806,6 +1054,7 @@
|
|
connectionStatus.setBackground(java.awt.Color.lightGray);
|
|
connectionStatus.setFont(
|
|
new java.awt.Font("Dialog", java.awt.Font.PLAIN, 10));
|
|
+//System.out.println("getConnectionStatus");
|
|
}
|
|
connectionStatus.setEditable(false);
|
|
return connectionStatus;
|
|
@@ -815,7 +1064,12 @@
|
|
* Implements Action listener.
|
|
*/
|
|
public void actionPerformed(ActionEvent evt) {
|
|
- System.out.println(evt.getSource());
|
|
+// System.out.println(evt.getSource());
|
|
+
|
|
+ if (ignore_events) {
|
|
+ System.out.println("ignore_events: " + evt.getSource());
|
|
+ return;
|
|
+ }
|
|
|
|
if (evt.getSource() == closeButton)
|
|
{ // Close Button
|
|
@@ -829,15 +1083,27 @@
|
|
{
|
|
doReceive();
|
|
}
|
|
+// begin runge/x11vnc
|
|
+ else if (evt.getSource() == viewButton)
|
|
+ {
|
|
+ doView();
|
|
+ }
|
|
+// end runge/x11vnc
|
|
else if (evt.getSource() == localDrivesComboBox)
|
|
{
|
|
changeLocalDrive();
|
|
}
|
|
else if (evt.getSource() == remoteDrivesComboBox)
|
|
{
|
|
+//System.out.println("remoteDrivesComboBox"); // runge/x11vnc
|
|
changeRemoteDrive();
|
|
- remoteList.clear();
|
|
- remoteFileTable.setListData(remoteList);
|
|
+
|
|
+ // are these really needed? changeRemoteDrive() does them at the end.
|
|
+ if (false) {
|
|
+ remoteList.clear();
|
|
+ remoteListInfo.clear();
|
|
+ remoteFileTable.setListData(remoteList);
|
|
+ }
|
|
}
|
|
else if (evt.getSource() == localTopButton)
|
|
{
|
|
@@ -845,12 +1111,17 @@
|
|
}
|
|
else if (evt.getSource() == remoteTopButton)
|
|
{
|
|
+//System.out.println("remoteTopButton"); // runge/x11vnc
|
|
changeRemoteDrive();
|
|
}
|
|
else if(evt.getSource() == deleteButton)
|
|
{
|
|
doDelete();
|
|
}
|
|
+ else if(evt.getSource() == refreshButton)
|
|
+ {
|
|
+ doRefresh();
|
|
+ }
|
|
else if(evt.getSource()==newFolderButton)
|
|
{
|
|
doNewFolder();
|
|
@@ -864,7 +1135,7 @@
|
|
|
|
private void doNewFolder()
|
|
{
|
|
- String name = JOptionPane.showInputDialog(null,"Enter new directory name", "Create New Directory", JOptionPane.QUESTION_MESSAGE);
|
|
+ String name = JOptionPane.showInputDialog(jContentPane,"Enter new directory name", "Create New Directory", JOptionPane.QUESTION_MESSAGE);
|
|
if(selectedTable.equals("remote"))
|
|
{
|
|
name = remoteLocation.getText()+name;
|
|
@@ -880,34 +1151,106 @@
|
|
historyComboBox.setSelectedIndex(0);
|
|
}
|
|
}
|
|
- private void doClose()
|
|
+ public void doClose()
|
|
{
|
|
+ if (viewer.ftpOnly) {
|
|
+ viewer.disconnect();
|
|
+ return;
|
|
+ }
|
|
try {
|
|
this.setVisible(false);
|
|
- viewer.rfb.writeFramebufferUpdateRequest(
|
|
- 0,
|
|
- 0,
|
|
- viewer.rfb.framebufferWidth,
|
|
- viewer.rfb.framebufferHeight,
|
|
- true);
|
|
+ viewer.rfb.writeFramebufferUpdateRequest(0, 0, viewer.rfb.framebufferWidth,
|
|
+ viewer.rfb.framebufferHeight, true);
|
|
+
|
|
+ if (false) {
|
|
+ this.dispose();
|
|
+ jContentPane = null;
|
|
+ }
|
|
} catch (IOException e) {
|
|
// TODO Auto-generated catch block
|
|
e.printStackTrace();
|
|
}
|
|
}
|
|
+ private void unSwing() {
|
|
+ jContentPane = null;
|
|
+ topPanel = null;
|
|
+ topPanelLocal = null;
|
|
+ topPanelRemote = null;
|
|
+ topPanelCenter = null;
|
|
+ statusPanel = null;
|
|
+ remotePanel = null;
|
|
+ localPanel = null;
|
|
+ buttonPanel = null;
|
|
+ sendButton = null;
|
|
+ receiveButton = null;
|
|
+ deleteButton = null;
|
|
+ newFolderButton = null;
|
|
+ stopButton = null;
|
|
+ closeButton = null;
|
|
+ dummyButton = null;
|
|
+ localDrivesComboBox = null;
|
|
+ remoteDrivesComboBox = null;
|
|
+ localMachineLabel = null;
|
|
+ remoteMachineLabel = null;
|
|
+ localTopButton = null;
|
|
+ remoteTopButton = null;
|
|
+ localScrollPane = null;
|
|
+ localFileTable = null;
|
|
+ remoteScrollPane = null;
|
|
+ remoteFileTable = null;
|
|
+ remoteLocation = null;
|
|
+ localLocation = null;
|
|
+ localStatus = null;
|
|
+ remoteStatus = null;
|
|
+ historyComboBox = null;
|
|
+ jProgressBar = null;
|
|
+ connectionStatus = null;
|
|
+ viewButton = null;
|
|
+ refreshButton = null;
|
|
+ }
|
|
+
|
|
+ public void doReset()
|
|
+ {
|
|
+ try {
|
|
+ this.setVisible(false);
|
|
+ this.dispose();
|
|
+ jContentPane = null;
|
|
+ try {Thread.sleep(500);} catch (InterruptedException e) {}
|
|
+ viewer.ftp_init();
|
|
+ } catch (Exception e) {
|
|
+ // TODO Auto-generated catch block
|
|
+ e.printStackTrace();
|
|
+ }
|
|
+ }
|
|
|
|
+ public void doOpen()
|
|
+ {
|
|
+ try {
|
|
+ this.setVisible(true);
|
|
+ if (false) {
|
|
+ this.initialize();
|
|
+ }
|
|
+ } catch (Exception e) {
|
|
+ // TODO Auto-generated catch block
|
|
+ e.printStackTrace();
|
|
+ }
|
|
+ }
|
|
private void doDelete()
|
|
{
|
|
- System.out.println("Delete Button Pressed");
|
|
+// System.out.println("Delete Button Pressed");
|
|
//Call this method to delete a file at server
|
|
if(selectedTable.equals("remote"))
|
|
{
|
|
- String sFileName = ((String) this.remoteFileTable.getSelectedValue());
|
|
+ Object selected = this.remoteFileTable.getSelectedValue();
|
|
+ if (selected == null) {
|
|
+ return;
|
|
+ }
|
|
+ String sFileName = ((String) selected);
|
|
|
|
// sf@2004 - Directory can't be deleted
|
|
if (sFileName.substring(0, 2).equals(" [") && sFileName.substring((sFileName.length() - 1), sFileName.length()).equals("]"))
|
|
{
|
|
- JOptionPane.showMessageDialog(null, (String)"Directory Deletion is not yet available in this version...", "FileTransfer Info", JOptionPane.INFORMATION_MESSAGE);
|
|
+ JOptionPane.showMessageDialog(jContentPane, (String)"Directory Deletion is not yet available in this version...", "FileTransfer Info", JOptionPane.INFORMATION_MESSAGE);
|
|
return;
|
|
}
|
|
|
|
@@ -916,7 +1259,7 @@
|
|
// sf@2004 - Delete prompt
|
|
if (remoteList.contains(sFileName))
|
|
{
|
|
- int r = JOptionPane.showConfirmDialog(null, "Are you sure you want to delete the file \n< " + sFileName + " >\n on Remote Machine ?", "File Transfer Warning", JOptionPane.YES_NO_OPTION);
|
|
+ int r = JOptionPane.showConfirmDialog(jContentPane, "Are you sure you want to delete the file \n< " + sFileName + " >\n on Remote Machine ?", "File Transfer Warning", JOptionPane.YES_NO_OPTION);
|
|
if (r == JOptionPane.NO_OPTION)
|
|
return;
|
|
}
|
|
@@ -926,18 +1269,22 @@
|
|
}
|
|
else
|
|
{
|
|
- String sFileName = ((String) this.localFileTable.getSelectedValue());
|
|
+ Object selected = this.localFileTable.getSelectedValue();
|
|
+ if (selected == null) {
|
|
+ return;
|
|
+ }
|
|
+ String sFileName = ((String) selected);
|
|
|
|
// sf@2004 - Directory can't be deleted
|
|
if (sFileName.substring(0, 2).equals(" [") && sFileName.substring((sFileName.length() - 1), sFileName.length()).equals("]"))
|
|
{
|
|
- JOptionPane.showMessageDialog(null, (String)"Directory Deletion is not yet available in this version...", "FileTransfer Info", JOptionPane.INFORMATION_MESSAGE);
|
|
+ JOptionPane.showMessageDialog(jContentPane, (String)"Directory Deletion is not yet available in this version...", "FileTransfer Info", JOptionPane.INFORMATION_MESSAGE);
|
|
return;
|
|
}
|
|
// sf@2004 - Delete prompt
|
|
if (localList.contains(sFileName))
|
|
{
|
|
- int r = JOptionPane.showConfirmDialog(null, "Are you sure you want to delete the file \n< " + sFileName + " >\n on Local Machine ?", "File Transfer Warning", JOptionPane.YES_NO_OPTION);
|
|
+ int r = JOptionPane.showConfirmDialog(jContentPane, "Are you sure you want to delete the file \n< " + sFileName + " >\n on Local Machine ?", "File Transfer Warning", JOptionPane.YES_NO_OPTION);
|
|
if (r == JOptionPane.NO_OPTION)
|
|
return;
|
|
}
|
|
@@ -952,21 +1299,25 @@
|
|
|
|
private void doReceive()
|
|
{
|
|
- System.out.println("Received Button Pressed");
|
|
+// System.out.println("Received Button Pressed");
|
|
|
|
- String sFileName = ((String) this.remoteFileTable.getSelectedValue());
|
|
+ Object selected = this.remoteFileTable.getSelectedValue();
|
|
+ if (selected == null) {
|
|
+ return;
|
|
+ }
|
|
+ String sFileName = ((String) selected);
|
|
|
|
// sf@2004 - Directory can't be transfered
|
|
if (sFileName.substring(0, 2).equals(" [") && sFileName.substring((sFileName.length() - 1), sFileName.length()).equals("]"))
|
|
{
|
|
- JOptionPane.showMessageDialog(null, (String)"Directory Transfer is not yet available in this version...", "FileTransfer Info", JOptionPane.INFORMATION_MESSAGE);
|
|
+ JOptionPane.showMessageDialog(jContentPane, (String)"Directory Transfer is not yet available in this version...", "FileTransfer Info", JOptionPane.INFORMATION_MESSAGE);
|
|
return;
|
|
}
|
|
|
|
// sf@2004 - Overwrite prompt
|
|
if (localList.contains(sFileName))
|
|
{
|
|
- int r = JOptionPane.showConfirmDialog(null, "The file < " + sFileName + " >\n already exists on Local Machine\n Are you sure you want to overwrite it ?", "File Transfer Warning", JOptionPane.YES_NO_OPTION);
|
|
+ int r = JOptionPane.showConfirmDialog(jContentPane, "The file < " + sFileName + " >\n already exists on Local Machine\n Are you sure you want to overwrite it ?", "File Transfer Warning", JOptionPane.YES_NO_OPTION);
|
|
if (r == JOptionPane.NO_OPTION)
|
|
return;
|
|
}
|
|
@@ -979,23 +1330,101 @@
|
|
viewer.rfb.requestRemoteFile(remoteFileName,localDestinationPath);
|
|
}
|
|
|
|
+// begin runge/x11vnc
|
|
+ private void doRefresh()
|
|
+ {
|
|
+ System.out.println("Refreshing Local and Remote.");
|
|
+ refreshLocalLocation();
|
|
+ refreshRemoteLocation();
|
|
+ }
|
|
+
|
|
+ private void doView()
|
|
+ {
|
|
+// System.out.println("View Button Pressed");
|
|
+
|
|
+ if (selectedTable == null) {
|
|
+ return;
|
|
+ }
|
|
+ if (selectedTable.equals("remote")) {
|
|
+ viewRemote();
|
|
+ } else if (selectedTable.equals("local")) {
|
|
+ viewLocal();
|
|
+ }
|
|
+ }
|
|
+
|
|
+ private File doReceiveTmp()
|
|
+ {
|
|
+
|
|
+ if (remoteFileTable == null) {
|
|
+ return null;
|
|
+ }
|
|
+ Object selected = this.remoteFileTable.getSelectedValue();
|
|
+ if (selected == null) {
|
|
+ return null;
|
|
+ }
|
|
+ String sFileName = ((String) selected);
|
|
+
|
|
+ if (sFileName == null) {
|
|
+ return null;
|
|
+ }
|
|
+
|
|
+ // sf@2004 - Directory can't be transfered
|
|
+ if (sFileName.substring(0, 2).equals(" [") && sFileName.substring((sFileName.length() - 1), sFileName.length()).equals("]"))
|
|
+ {
|
|
+ return null;
|
|
+ }
|
|
+
|
|
+ File tmp = null;
|
|
+ try {
|
|
+ tmp = File.createTempFile("ULTRAFTP", ".txt");
|
|
+ } catch (Exception e) {
|
|
+ return null;
|
|
+ }
|
|
+
|
|
+ //updateHistory("Downloaded " + localSelection.toString());
|
|
+ String remoteFileName = this.remoteLocation.getText();
|
|
+ remoteFileName+= ((String) this.remoteFileTable.getSelectedValue()).substring(1);
|
|
+ System.out.println("remoteFileName: " + remoteFileName);
|
|
+if (false) {
|
|
+ char[] b = remoteFileName.toCharArray();
|
|
+ for (int n = 0; n < b.length; n++) {
|
|
+ System.out.print(Integer.toHexString(b[n]) + " ");
|
|
+ }
|
|
+ System.out.println("");
|
|
+ for (int n = 0; n < b.length; n++) {
|
|
+ System.out.print(b[n]);
|
|
+ }
|
|
+ System.out.println("");
|
|
+}
|
|
+
|
|
+ String localDestinationPath = tmp.getAbsolutePath();
|
|
+ viewer.rfb.requestRemoteFile(remoteFileName,localDestinationPath);
|
|
+ System.out.println("ReceiveTmp: " + localDestinationPath);
|
|
+ return tmp;
|
|
+ }
|
|
+// end runge/x11vnc
|
|
+
|
|
private void doSend()
|
|
{
|
|
- System.out.println("Send Button Pressed");
|
|
+// System.out.println("Send Button Pressed");
|
|
|
|
- String sFileName = ((String) this.localFileTable.getSelectedValue());
|
|
+ Object selected = this.localFileTable.getSelectedValue();
|
|
+ if (selected == null) {
|
|
+ return;
|
|
+ }
|
|
+ String sFileName = ((String) selected);
|
|
|
|
// sf@2004 - Directory can't be transfered
|
|
if (sFileName.substring(0, 2).equals(" [") && sFileName.substring((sFileName.length() - 1), sFileName.length()).equals("]"))
|
|
{
|
|
- JOptionPane.showMessageDialog(null, (String)"Directory Transfer is not yet available in this version...", "FileTransfer Info", JOptionPane.INFORMATION_MESSAGE);
|
|
+ JOptionPane.showMessageDialog(jContentPane, (String)"Directory Transfer is not yet available in this version...", "FileTransfer Info", JOptionPane.INFORMATION_MESSAGE);
|
|
return;
|
|
}
|
|
|
|
// sf@2004 - Overwrite prompt
|
|
if (remoteList.contains(sFileName))
|
|
{
|
|
- int r = JOptionPane.showConfirmDialog(null, "The file < " + sFileName + " >\n already exists on Remote Machine\n Are you sure you want to overwrite it ?", "File Transfer Warning", JOptionPane.YES_NO_OPTION);
|
|
+ int r = JOptionPane.showConfirmDialog(jContentPane, "The file < " + sFileName + " >\n already exists on Remote Machine\n Are you sure you want to overwrite it ?", "File Transfer Warning", JOptionPane.YES_NO_OPTION);
|
|
if (r == JOptionPane.NO_OPTION)
|
|
return;
|
|
}
|
|
@@ -1013,6 +1442,7 @@
|
|
//
|
|
private void doStop()
|
|
{
|
|
+ System.out.println("** Current Transfer Aborted **");
|
|
viewer.rfb.fAbort = true;
|
|
}
|
|
/**
|
|
@@ -1024,6 +1454,14 @@
|
|
System.out.println("History: " + message);
|
|
historyComboBox.insertItemAt(new String(message), 0);
|
|
}
|
|
+
|
|
+ public void receivedRemoteDirectoryName(String str) {
|
|
+ if (doingShortcutDir) {
|
|
+ if (str.length() > 1) {
|
|
+ remoteLocation.setText(str);
|
|
+ }
|
|
+ }
|
|
+ }
|
|
|
|
/**
|
|
* This method updates the file table to the current selection of the remoteComboBox
|
|
@@ -1034,11 +1472,44 @@
|
|
remoteSelection = null;
|
|
|
|
if (!updateDriveList) {
|
|
- String drive = remoteDrivesComboBox.getSelectedItem().toString().substring(0,1)+ ":\\";
|
|
- viewer.rfb.readServerDirectory(drive);
|
|
- remoteLocation.setText(drive);
|
|
+//System.out.println("changeRemoteDrive-A " + drive); // begin runge/x11vnc
|
|
+ Object selected = remoteDrivesComboBox.getSelectedItem();
|
|
+ if (selected != null) {
|
|
+ String instr = selected.toString();
|
|
+ if (instr != null) {
|
|
+System.out.println("changeRemoteDrive: instr='" + instr + "'");
|
|
+ String drive = instr.substring(0,1)+ ":\\";
|
|
+ if (instr.startsWith(" [")) {
|
|
+ int idx = instr.lastIndexOf(']');
|
|
+ if (idx > 2) {
|
|
+ drive = instr.substring(2, idx);
|
|
+ } else {
|
|
+ drive = instr.substring(2);
|
|
+ }
|
|
+ if (drive.equals("Home")) {
|
|
+ drive = "";
|
|
+ }
|
|
+ drive += "\\";
|
|
+ doingShortcutDir = true;
|
|
+ } else {
|
|
+ doingShortcutDir = false;
|
|
+ drive = saveRemoteHack(drive);
|
|
+ }
|
|
+ gotShortcutDir = false;
|
|
+ viewer.rfb.readServerDirectory(drive);
|
|
+ if (!gotShortcutDir) {
|
|
+ remoteLocation.setText(drive);
|
|
+ }
|
|
+ } else {
|
|
+System.out.println("changeRemoteDrive: instr null");
|
|
+ }
|
|
+ } else {
|
|
+System.out.println("changeRemoteDrive: selection null");
|
|
+ }
|
|
+//System.out.println("changeRemoteDrive-B " + drive); // end runge/x11vnc
|
|
}
|
|
remoteList.clear();
|
|
+ remoteListInfo.clear();
|
|
remoteFileTable.setListData(remoteList);
|
|
}
|
|
/**
|
|
@@ -1048,6 +1519,7 @@
|
|
private void changeLocalDrive()
|
|
{
|
|
File currentDrive = new File(localDrivesComboBox.getSelectedItem().toString());
|
|
+System.out.println("changeLocalDrive " + currentDrive.toString()); // runge/x11vnc
|
|
if(currentDrive.canRead())
|
|
{
|
|
localSelection = null;
|
|
@@ -1057,9 +1529,11 @@
|
|
else
|
|
{
|
|
localList.clear();
|
|
+ localListInfo.clear();
|
|
localStatus.setText("WARNING: Drive " + localDrivesComboBox.getSelectedItem().toString());
|
|
connectionStatus.setText(" > WARNING - Local Drive unavailable (possibly restricted access or media not present)");
|
|
}
|
|
+
|
|
}
|
|
/**
|
|
* Determines which FileTable was double-clicked and updates the table
|
|
@@ -1098,10 +1572,18 @@
|
|
selectedTable = "remote";
|
|
localFileTable.setBackground(new Color(238, 238, 238));
|
|
remoteFileTable.setBackground(new Color(255, 255, 255));
|
|
- String name = (remoteFileTable.getSelectedValue().toString()).substring(1);
|
|
+ Object selected = remoteFileTable.getSelectedValue();
|
|
+ if (selected == null) {
|
|
+ return;
|
|
+ }
|
|
+ String selstr = selected.toString();
|
|
+ if (selstr == null) {
|
|
+ return;
|
|
+ }
|
|
+ String name = selstr.substring(1);
|
|
if( !name.substring(0, 2).equals(" ["))
|
|
remoteSelection = remoteLocation.getText() + name.substring(0, name.length());
|
|
-
|
|
+
|
|
}
|
|
|
|
/*
|
|
@@ -1115,10 +1597,38 @@
|
|
localFileTable.setBackground(new Color(255, 255, 255));
|
|
File currentSelection = new File(currentLocalDirectory, getTrimmedSelection());
|
|
|
|
- if(currentSelection.isFile())
|
|
+// begin runge/x11vnc
|
|
+ // localSelection = currentSelection.getAbsoluteFile();
|
|
+ if(currentSelection.isFile()) {
|
|
localSelection = currentSelection.getAbsoluteFile();
|
|
+ localCurrentIsDir = false;
|
|
+ } else {
|
|
+ localCurrentIsDir = true;
|
|
+ }
|
|
+// end runge/x11vnc
|
|
|
|
}
|
|
+
|
|
+// begin runge/x11vnc
|
|
+ private void viewRemote() {
|
|
+ File tmp = doReceiveTmp();
|
|
+ if (tmp == null) {
|
|
+ return;
|
|
+ }
|
|
+ TextViewer tv = new TextViewer("Remote: " + remoteSelection, tmp, true);
|
|
+ }
|
|
+ private void viewLocal() {
|
|
+ if (localSelection == null) {
|
|
+ return;
|
|
+ }
|
|
+ if (localCurrentIsDir) {
|
|
+ return;
|
|
+ }
|
|
+ File loc = new File(localSelection.toString());
|
|
+ TextViewer tv = new TextViewer("Local: " + localSelection.toString(), loc, false);
|
|
+ }
|
|
+// end runge/x11vnc
|
|
+
|
|
/**
|
|
* Updates the Remote File Table based on selection. Called from mouseClicked handler
|
|
*/
|
|
@@ -1126,20 +1636,29 @@
|
|
String name = null;
|
|
String action = null;
|
|
String drive = null;
|
|
- name = (remoteFileTable.getSelectedValue().toString()).substring(1);
|
|
+ Object selected = remoteFileTable.getSelectedValue();
|
|
+ if (selected == null) {
|
|
+ return;
|
|
+ }
|
|
+ String sname = selected.toString();
|
|
+ if (sname == null) {
|
|
+ return;
|
|
+ }
|
|
+ name = sname.substring(1);
|
|
|
|
if (name.equals("[..]"))
|
|
{
|
|
action = "up";
|
|
remoteSelection = null;
|
|
drive = remoteLocation.getText().substring(0, remoteLocation.getText().length() - 1);
|
|
- // JOptionPane.showMessageDialog(null, (String)drive, "FileTransfer DEBUG", JOptionPane.INFORMATION_MESSAGE);
|
|
+ // JOptionPane.showMessageDialog(jContentPane, (String)drive, "FileTransfer DEBUG", JOptionPane.INFORMATION_MESSAGE);
|
|
int index = drive.lastIndexOf("\\");
|
|
drive = drive.substring(0, index + 1);
|
|
|
|
remoteLocation.setText(drive);
|
|
viewer.rfb.readServerDirectory(drive);
|
|
remoteList.clear();
|
|
+ remoteListInfo.clear();
|
|
remoteFileTable.setListData(remoteList);
|
|
}
|
|
else if (!name.substring(0, 2).equals(" [") && !name.substring((name.length() - 1), name.length()).equals("]"))
|
|
@@ -1149,6 +1668,7 @@
|
|
remoteSelection = remoteLocation.getText() + name.substring(0, name.length());
|
|
drive = remoteLocation.getText();
|
|
// ??
|
|
+ viewRemote(); // runge/x11vnc
|
|
}
|
|
else
|
|
{
|
|
@@ -1159,10 +1679,12 @@
|
|
remoteLocation.setText(drive);
|
|
viewer.rfb.readServerDirectory(drive);
|
|
remoteList.clear();
|
|
+ remoteListInfo.clear();
|
|
remoteFileTable.setListData(remoteList);
|
|
}
|
|
//remoteLocation.setText(drive);
|
|
}
|
|
+
|
|
/**
|
|
* Updates the Local File Table based on selection. Called from MouseClicked handler
|
|
*/
|
|
@@ -1188,6 +1710,7 @@
|
|
else if (currentSelection.isFile())
|
|
{
|
|
localSelection = currentSelection.getAbsoluteFile();
|
|
+ viewLocal(); // runge/x11vnc
|
|
}
|
|
else if (currentSelection.isDirectory())
|
|
{
|
|
@@ -1201,13 +1724,22 @@
|
|
*
|
|
*/
|
|
private String getTrimmedSelection(){
|
|
- String currentSelection = (localFileTable.getSelectedValue().toString()).substring(1);
|
|
- if(currentSelection.substring(0,1).equals("[") &&
|
|
- currentSelection.substring(currentSelection.length()-1,currentSelection.length()).equals("]")){
|
|
- return currentSelection.substring(1,currentSelection.length()-1);
|
|
- } else {
|
|
- return currentSelection;
|
|
- }
|
|
+ String currentSelection = "";
|
|
+ Object selected = localFileTable.getSelectedValue();
|
|
+ if (selected == null) {
|
|
+ return currentSelection;
|
|
+ }
|
|
+ String selstr = selected.toString();
|
|
+ if (selstr == null) {
|
|
+ return currentSelection;
|
|
+ }
|
|
+ currentSelection = selstr.substring(1);
|
|
+ if(currentSelection.substring(0,1).equals("[") &&
|
|
+ currentSelection.substring(currentSelection.length()-1,currentSelection.length()).equals("]")){
|
|
+ return currentSelection.substring(1,currentSelection.length()-1);
|
|
+ } else {
|
|
+ return currentSelection;
|
|
+ }
|
|
}
|
|
|
|
/*
|
|
@@ -1241,36 +1773,148 @@
|
|
return null;
|
|
}
|
|
|
|
+ String timeStr(long t) {
|
|
+ Date date = new Date(t);
|
|
+ return date.toString();
|
|
+ }
|
|
+ String dotPast(double f, int n) {
|
|
+ String fs = "" + f;
|
|
+ int i = fs.lastIndexOf(".") + n;
|
|
+ if (i >= 0) {
|
|
+ int len = fs.length();
|
|
+ if (i >= len) {
|
|
+ i = len-1;
|
|
+ }
|
|
+ fs = fs.substring(0, i);
|
|
+ }
|
|
+ return fs;
|
|
+ }
|
|
+ String sizeStr(int s) {
|
|
+ if (s < 0) {
|
|
+ return s + "? B";
|
|
+ } else if (s < 1024) {
|
|
+ return s + " B";
|
|
+ } else if (s < 1024 * 1024) {
|
|
+ double k = s / 1024.0;
|
|
+ String ks = dotPast(k, 3);
|
|
+
|
|
+ return s + " (" + ks + " KB)";
|
|
+ } else {
|
|
+ double m = s / (1024.0*1024.0);
|
|
+ String ms = dotPast(m, 3);
|
|
+ return s + " (" + ms + " MB)";
|
|
+ }
|
|
+ }
|
|
+
|
|
+ int max_char(String text) {
|
|
+ int maxc = 0;
|
|
+ char chars[] = text.toCharArray();
|
|
+ for (int n = 0; n < chars.length; n++) {
|
|
+ if ((int) chars[n] > maxc) {
|
|
+ maxc = (int) chars[n];
|
|
+ }
|
|
+ }
|
|
+ return maxc;
|
|
+ }
|
|
|
|
/*
|
|
* Navigates the local file structure up or down one directory
|
|
*/
|
|
public void changeLocalDirectory(File dir)
|
|
{
|
|
- currentLocalDirectory = dir; // Updates Global
|
|
+ dir = saveLocalHack(dir); // runge/x11vnc
|
|
+
|
|
+ if (dir == null) {
|
|
+ connectionStatus.setText("Error changing local directory.");
|
|
+ historyComboBox.insertItemAt(new String("> Error changing local directory."), 0);
|
|
+ historyComboBox.setSelectedIndex(0);
|
|
+ return;
|
|
+ }
|
|
+
|
|
File allFiles[] = dir.listFiles(); // Reads files
|
|
String[] contents = dir.list();
|
|
|
|
+ if (contents == null || allFiles == null) {
|
|
+ connectionStatus.setText("Error changing local directory.");
|
|
+ historyComboBox.insertItemAt(new String("> Error changing local directory."), 0);
|
|
+ historyComboBox.setSelectedIndex(0);
|
|
+ return;
|
|
+ }
|
|
+
|
|
+ currentLocalDirectory = dir; // Updates Global
|
|
+// begin runge/x11vnc
|
|
+System.out.println("changeLocalDirectory: " + dir.toString());
|
|
+ if (contents != null) {
|
|
+ java.util.Arrays.sort(contents, String.CASE_INSENSITIVE_ORDER);
|
|
+ for (int i = 0; i < contents.length; i++) {
|
|
+ allFiles[i] = new File(dir, contents[i]);
|
|
+ }
|
|
+ } else {
|
|
+ return;
|
|
+ }
|
|
+// end runge/x11vnc
|
|
+
|
|
localList.clear();
|
|
+ localListInfo.clear();
|
|
localList.addElement(" [..]");
|
|
+ localListInfo.addElement(" [..]");
|
|
+
|
|
+ ArrayList DirInfo = new ArrayList();
|
|
+ ArrayList FilInfo = new ArrayList();
|
|
+
|
|
+ Charset charset = Charset.forName("ISO-8859-1");
|
|
+ CharsetDecoder decoder = charset.newDecoder();
|
|
+ CharsetEncoder encoder = charset.newEncoder();
|
|
|
|
// Populate the Lists
|
|
for (int i = 0; i < contents.length; i++)
|
|
{
|
|
- if (allFiles[i].isDirectory())
|
|
+ String f1 = contents[i];
|
|
+
|
|
+if (false) {
|
|
+
|
|
+System.out.println("max_char: " + max_char(f1) + " " + f1);
|
|
+ if (max_char(f1) > 255) {
|
|
+ try {
|
|
+System.out.println("bbuf1");
|
|
+ ByteBuffer bbuf = encoder.encode(CharBuffer.wrap(f1.toCharArray()));
|
|
+System.out.println("bbuf2");
|
|
+ CharBuffer cbuf = decoder.decode(bbuf);
|
|
+System.out.println("bbuf3");
|
|
+ f1 = cbuf.toString();
|
|
+System.out.println("did bbuf: " + f1);
|
|
+ } catch (Exception e) {
|
|
+ ;
|
|
+ }
|
|
+ }
|
|
+}
|
|
+
|
|
+ String f2 = f1;
|
|
+ if (f2.length() < 24) {
|
|
+ for (int ik = f2.length(); ik < 24; ik++) {
|
|
+ f2 = f2 + " ";
|
|
+ }
|
|
+ }
|
|
+ String s = f2 + " \tLastmod: " + timeStr(allFiles[i].lastModified()) + " \t\tSize: " + sizeStr((int) allFiles[i].length());
|
|
+ if (allFiles[i].isDirectory()) {
|
|
// localList.addElement("[" + contents[i] + "]");
|
|
- DirsList.add(" [" + contents[i] + "]"); // sf@2004
|
|
- else
|
|
- {
|
|
+ DirsList.add(" [" + f1 + "]"); // sf@2004
|
|
+ DirInfo.add(s);
|
|
+ } else {
|
|
// localList.addElement(contents[i]);
|
|
- FilesList.add(" " + contents[i]); // sf@2004
|
|
+ FilesList.add(" " + f1); // sf@2004
|
|
+ FilInfo.add(s);
|
|
}
|
|
}
|
|
// sf@2004
|
|
- for (int i = 0; i < DirsList.size(); i++)
|
|
+ for (int i = 0; i < DirsList.size(); i++) {
|
|
localList.addElement(DirsList.get(i));
|
|
- for (int i = 0; i < FilesList.size(); i++)
|
|
+ localListInfo.addElement(DirInfo.get(i));
|
|
+ }
|
|
+ for (int i = 0; i < FilesList.size(); i++) {
|
|
localList.addElement(FilesList.get(i));
|
|
+ localListInfo.addElement(FilInfo.get(i));
|
|
+ }
|
|
|
|
FilesList.clear();
|
|
DirsList.clear();
|
|
@@ -1296,3 +1940,147 @@
|
|
}
|
|
|
|
} // @jve:visual-info decl-index=0 visual-constraint="10,10"
|
|
+
|
|
+// begin runge/x11vnc
|
|
+class TextViewer extends JFrame implements ActionListener {
|
|
+
|
|
+ JTextArea textArea = new JTextArea(35, 80);
|
|
+ File file = null;
|
|
+ JButton refreshButton;
|
|
+ JButton dismissButton;
|
|
+ Timer tim = null;
|
|
+ int rcnt = 0;
|
|
+ int tms = 250;
|
|
+ boolean delete_it = false;
|
|
+ TextViewer me;
|
|
+
|
|
+ public TextViewer(String s, File f, boolean d) {
|
|
+
|
|
+ delete_it = d;
|
|
+ file = f;
|
|
+ me = this;
|
|
+
|
|
+ JScrollPane scrollPane = new JScrollPane(textArea,
|
|
+ JScrollPane.VERTICAL_SCROLLBAR_ALWAYS,
|
|
+ JScrollPane.HORIZONTAL_SCROLLBAR_ALWAYS);
|
|
+
|
|
+ textArea.setEditable(false);
|
|
+ textArea.setFont(new Font("Monospaced", Font.PLAIN, 12));
|
|
+
|
|
+ KeyStroke stroke = KeyStroke.getKeyStroke(KeyEvent.VK_ESCAPE, InputEvent.SHIFT_MASK);
|
|
+ AbstractAction escapeAction = new AbstractAction() {
|
|
+ public void actionPerformed(ActionEvent actionEvent) {
|
|
+ cleanse();
|
|
+ me.dispose();
|
|
+ }
|
|
+ };
|
|
+ textArea.getInputMap(JComponent.WHEN_ANCESTOR_OF_FOCUSED_COMPONENT).put(stroke, "escapeAction");
|
|
+ textArea.getInputMap().put(stroke, "escapeAction");
|
|
+ textArea.getActionMap().put("escapeAction", escapeAction);
|
|
+
|
|
+ refreshButton = new JButton();
|
|
+ refreshButton.setText("Reload");
|
|
+ refreshButton.setName("refreshButton");
|
|
+ refreshButton.addActionListener(this);
|
|
+
|
|
+ dismissButton = new JButton();
|
|
+ dismissButton.setText("Dismiss");
|
|
+ dismissButton.setName("dismissButton");
|
|
+ dismissButton.addActionListener(this);
|
|
+
|
|
+ JPanel buttons = new JPanel();
|
|
+ buttons.setLayout(new BorderLayout());
|
|
+ buttons.add(refreshButton, BorderLayout.WEST);
|
|
+ buttons.add(dismissButton, BorderLayout.EAST);
|
|
+
|
|
+ JPanel content = new JPanel();
|
|
+ content.setLayout(new BorderLayout());
|
|
+ content.add(scrollPane, BorderLayout.CENTER);
|
|
+ content.add(buttons, BorderLayout.SOUTH);
|
|
+
|
|
+ ActionListener tsk = new ActionListener() {
|
|
+ public void actionPerformed(ActionEvent evt) {
|
|
+ // System.out.println("tsk");
|
|
+ refresh();
|
|
+ }
|
|
+ };
|
|
+ tim = new Timer(tms, tsk);
|
|
+ tim.start();
|
|
+
|
|
+ this.setContentPane(content);
|
|
+ this.setTitle("TextViewer - " + s);
|
|
+ this.pack();
|
|
+ this.setVisible(true);
|
|
+ }
|
|
+
|
|
+ private void refresh() {
|
|
+
|
|
+ rcnt++;
|
|
+ if (rcnt * tms > 3000 && tim != null) {
|
|
+ tim.stop();
|
|
+ tim = null;
|
|
+ }
|
|
+ BufferedReader input = null;
|
|
+ StringBuffer contents = new StringBuffer();
|
|
+ try {
|
|
+ if (input == null) {
|
|
+ input = new BufferedReader(new FileReader(file));
|
|
+ }
|
|
+ String line = null;
|
|
+ int i = 0;
|
|
+ while (( line = input.readLine()) != null) {
|
|
+ if (i == 0) {
|
|
+ // System.out.println("read");
|
|
+ }
|
|
+ i++;
|
|
+ contents.append(line);
|
|
+ contents.append(System.getProperty("line.separator"));
|
|
+ }
|
|
+ } catch (Exception e) {
|
|
+ ;
|
|
+ } finally {
|
|
+ try {
|
|
+ if (input != null) {
|
|
+ input.close();
|
|
+ input = null;
|
|
+ }
|
|
+ } catch (Exception e) {
|
|
+ ;
|
|
+ }
|
|
+ }
|
|
+
|
|
+ textArea.setText(contents.toString());
|
|
+ textArea.setCaretPosition(0);
|
|
+ }
|
|
+
|
|
+ public void actionPerformed(ActionEvent evt) {
|
|
+
|
|
+ if (evt.getSource() == refreshButton) {
|
|
+ refresh();
|
|
+ }
|
|
+ if (evt.getSource() == dismissButton) {
|
|
+ cleanse();
|
|
+ this.dispose();
|
|
+ }
|
|
+ }
|
|
+
|
|
+ private void cleanse() {
|
|
+ if (delete_it && file != null) {
|
|
+ try {
|
|
+ file.delete();
|
|
+ file = null;
|
|
+ } catch (Exception e) {
|
|
+ ;
|
|
+ }
|
|
+ }
|
|
+ }
|
|
+
|
|
+ protected void finalize() throws Throwable {
|
|
+ try {
|
|
+ cleanse();
|
|
+ } finally {
|
|
+ super.finalize();
|
|
+ }
|
|
+ }
|
|
+}
|
|
+// end runge/x11vnc
|
|
diff -Naur JavaViewer.orig/Makefile JavaViewer/Makefile
|
|
--- JavaViewer.orig/Makefile 2006-05-29 09:06:32.000000000 -0400
|
|
+++ JavaViewer/Makefile 2010-05-18 20:53:32.000000000 -0400
|
|
@@ -4,6 +4,7 @@
|
|
|
|
CP = cp
|
|
JC = javac
|
|
+JC_ARGS = -target 1.4 -source 1.4
|
|
JAR = jar
|
|
ARCHIVE = VncViewer.jar
|
|
PAGES = index.vnc shared.vnc noshared.vnc hextile.vnc zlib.vnc tight.vnc
|
|
@@ -20,7 +21,7 @@
|
|
all: $(CLASSES) $(ARCHIVE)
|
|
|
|
$(CLASSES): $(SOURCES)
|
|
- $(JC) -O $(SOURCES)
|
|
+ $(JC) $(JC_ARGS) -O $(SOURCES)
|
|
|
|
$(ARCHIVE): $(CLASSES)
|
|
$(JAR) cf $(ARCHIVE) $(CLASSES)
|
|
diff -Naur JavaViewer.orig/OptionsFrame.java JavaViewer/OptionsFrame.java
|
|
--- JavaViewer.orig/OptionsFrame.java 2005-11-21 18:50:16.000000000 -0500
|
|
+++ JavaViewer/OptionsFrame.java 2007-05-13 22:18:30.000000000 -0400
|
|
@@ -144,7 +144,10 @@
|
|
choices[jpegQualityIndex].select("6");
|
|
choices[cursorUpdatesIndex].select("Enable");
|
|
choices[useCopyRectIndex].select("Yes");
|
|
- choices[eightBitColorsIndex].select("64");
|
|
+// begin runge/x11vnc
|
|
+// choices[eightBitColorsIndex].select("64");
|
|
+ choices[eightBitColorsIndex].select("Full");
|
|
+// end runge/x11vnc
|
|
choices[mouseButtonIndex].select("Normal");
|
|
choices[viewOnlyIndex].select("No");
|
|
choices[shareDesktopIndex].select("Yes");
|
|
diff -Naur JavaViewer.orig/RfbProto.java JavaViewer/RfbProto.java
|
|
--- JavaViewer.orig/RfbProto.java 2006-05-24 15:14:40.000000000 -0400
|
|
+++ JavaViewer/RfbProto.java 2010-11-30 22:13:58.000000000 -0500
|
|
@@ -31,6 +31,7 @@
|
|
import java.net.Socket;
|
|
import java.util.*;
|
|
import java.util.zip.*;
|
|
+import java.text.DateFormat;
|
|
|
|
|
|
class RfbProto {
|
|
@@ -86,8 +87,11 @@
|
|
|
|
// sf@2004 - FileTransfer part
|
|
ArrayList remoteDirsList;
|
|
+ ArrayList remoteDirsListInfo;
|
|
ArrayList remoteFilesList;
|
|
+ ArrayList remoteFilesListInfo;
|
|
ArrayList a;
|
|
+ ArrayList b;
|
|
boolean fFTInit = true; // sf@2004
|
|
boolean fFTAllowed = true;
|
|
boolean fAbort = false;
|
|
@@ -199,6 +203,10 @@
|
|
// playback.
|
|
int numUpdatesInSession;
|
|
|
|
+// begin runge/x11vnc
|
|
+ int readServerDriveListCnt = -1;
|
|
+ long readServerDriveListTime = 0;
|
|
+// end runge/x11vnc
|
|
//
|
|
// Constructor. Make TCP connection to RFB server.
|
|
//
|
|
@@ -207,7 +215,27 @@
|
|
viewer = v;
|
|
host = h;
|
|
port = p;
|
|
- sock = new Socket(host, port);
|
|
+// begin runge/x11vnc
|
|
+// sock = new Socket(host, port);
|
|
+ if (! viewer.disableSSL) {
|
|
+ System.out.println("new SSLSocketToMe");
|
|
+ SSLSocketToMe ssl;
|
|
+ try {
|
|
+ ssl = new SSLSocketToMe(host, port, v);
|
|
+ } catch (Exception e) {
|
|
+ throw new IOException(e.getMessage());
|
|
+ }
|
|
+
|
|
+ try {
|
|
+ sock = ssl.connectSock();
|
|
+ } catch (Exception es) {
|
|
+ throw new IOException(es.getMessage());
|
|
+ }
|
|
+ } else {
|
|
+ sock = new Socket(host, port);
|
|
+ }
|
|
+// end runge/x11vnc
|
|
+
|
|
is =
|
|
new DataInputStream(
|
|
new BufferedInputStream(sock.getInputStream(), 16384));
|
|
@@ -215,9 +243,12 @@
|
|
osw = new OutputStreamWriter(sock.getOutputStream());
|
|
inDirectory2 = false;
|
|
a = new ArrayList();
|
|
+ b = new ArrayList();
|
|
// sf@2004
|
|
remoteDirsList = new ArrayList();
|
|
+ remoteDirsListInfo = new ArrayList();
|
|
remoteFilesList = new ArrayList();
|
|
+ remoteFilesListInfo = new ArrayList();
|
|
|
|
sendFileSource = "";
|
|
}
|
|
@@ -420,7 +451,13 @@
|
|
//
|
|
|
|
int readServerMessageType() throws IOException {
|
|
- int msgType = is.readUnsignedByte();
|
|
+ int msgType;
|
|
+ try {
|
|
+ msgType = is.readUnsignedByte();
|
|
+ } catch (Exception e) {
|
|
+ viewer.disconnect();
|
|
+ return -1;
|
|
+ }
|
|
|
|
// If the session is being recorded:
|
|
if (rec != null) {
|
|
@@ -600,6 +637,7 @@
|
|
contentParamT = is.readUnsignedByte();
|
|
contentParamT = contentParamT << 8;
|
|
contentParam = contentParam | contentParamT;
|
|
+//System.out.println("FTM: contentType " + contentType + " contentParam " + contentParam);
|
|
if (contentType == rfbRDrivesList || contentType == rfbDirPacket)
|
|
{
|
|
readDriveOrDirectory(contentParam);
|
|
@@ -610,7 +648,7 @@
|
|
}
|
|
else if (contentType == rfbFilePacket)
|
|
{
|
|
- receiveFileChunk();
|
|
+ receiveFileChunk();
|
|
}
|
|
else if (contentType == rfbEndOfFile)
|
|
{
|
|
@@ -618,6 +656,10 @@
|
|
}
|
|
else if (contentType == rfbAbortFileTransfer)
|
|
{
|
|
+ System.out.println("rfbAbortFileTransfer: fFileReceptionRunning="
|
|
+ + fFileReceptionRunning + " fAbort="
|
|
+ + fAbort + " fFileReceptionError="
|
|
+ + fFileReceptionError);
|
|
if (fFileReceptionRunning)
|
|
{
|
|
endOfReceiveFile(false); // Error
|
|
@@ -626,6 +668,11 @@
|
|
{
|
|
// sf@2004 - Todo: Add TestPermission
|
|
// System.out.println("File Transfer Aborted!");
|
|
+
|
|
+ // runge: seems like we must at least read the remaining
|
|
+ // 8 bytes of the header, right?
|
|
+ int size = is.readInt();
|
|
+ int length = is.readInt();
|
|
}
|
|
|
|
}
|
|
@@ -645,6 +692,7 @@
|
|
{
|
|
System.out.println("ContentType: " + contentType);
|
|
}
|
|
+//System.out.println("FTM: done");
|
|
}
|
|
|
|
//Refactored from readRfbFileTransferMsg()
|
|
@@ -662,6 +710,7 @@
|
|
|
|
//Refactored from readRfbFileTransferMsg()
|
|
public void readDriveOrDirectory(int contentParam) throws IOException {
|
|
+//System.out.println("RDOD: " + contentParam + " " + inDirectory2);
|
|
if (contentParam == rfbADrivesList)
|
|
{
|
|
readFTPMsgDriveList();
|
|
@@ -688,13 +737,21 @@
|
|
|
|
// Internally used. Write an Rfb message to the server
|
|
void writeRfbFileTransferMsg(
|
|
- int contentType,
|
|
- int contentParam,
|
|
- long size, // 0 : compression not supported - 1 : compression supported
|
|
- long length,
|
|
- String text) throws IOException
|
|
+ int contentType,
|
|
+ int contentParam,
|
|
+ long size, // 0 : compression not supported - 1 : compression supported
|
|
+ long length,
|
|
+ String text) throws IOException
|
|
{
|
|
byte b[] = new byte[12];
|
|
+ byte byteArray[];
|
|
+
|
|
+ if (viewer.dsmActive) {
|
|
+ // need to send the rfbFileTransfer msg type twice for the plugin...
|
|
+ byte b2[] = new byte[1];
|
|
+ b2[0] = (byte) rfbFileTransfer;
|
|
+ os.write(b2);
|
|
+ }
|
|
|
|
b[0] = (byte) rfbFileTransfer;
|
|
b[1] = (byte) contentType;
|
|
@@ -702,7 +759,7 @@
|
|
|
|
byte by = 0;
|
|
long c = 0;
|
|
- length++;
|
|
+
|
|
c = size & 0xFF000000;
|
|
by = (byte) (c >>> 24);
|
|
b[4] = by;
|
|
@@ -716,6 +773,32 @@
|
|
by = (byte) c;
|
|
b[7] = by;
|
|
|
|
+ if (text != null) {
|
|
+ byte byteArray0[] = text.getBytes();
|
|
+ int maxc = max_char(text);
|
|
+ if (maxc > 255) {
|
|
+ System.out.println("writeRfbFileTransferMsg: using getBytes(\"UTF-8\")");
|
|
+ byteArray0 = text.getBytes("UTF-8");
|
|
+ } else if (maxc > 127) {
|
|
+ System.out.println("writeRfbFileTransferMsg: using getBytes(\"ISO-8859-1\")");
|
|
+ byteArray0 = text.getBytes("ISO-8859-1");
|
|
+ }
|
|
+ byteArray = new byte[byteArray0.length + 1];
|
|
+ for (int i = 0; i < byteArray0.length; i++) {
|
|
+ byteArray[i] = byteArray0[i];
|
|
+ }
|
|
+ byteArray[byteArray.length - 1] = 0;
|
|
+System.out.println("writeRfbFileTransferMsg: length: " + length + " -> byteArray.length: " + byteArray.length);
|
|
+
|
|
+ // will equal length for ascii, ISO-8859-1, more for UTF-8
|
|
+ length = byteArray.length;
|
|
+
|
|
+ //length++; // used to not include null byte at end.
|
|
+ } else {
|
|
+ String moo = "moo";
|
|
+ byteArray = moo.getBytes();
|
|
+ }
|
|
+
|
|
c = length & 0xFF000000;
|
|
by = (byte) (c >>> 24);
|
|
b[8] = by;
|
|
@@ -729,29 +812,91 @@
|
|
by = (byte) c;
|
|
b[11] = by;
|
|
os.write(b);
|
|
+
|
|
+//System.out.println("size: " + size + " length: " + length + " text: " + text);
|
|
|
|
|
|
if (text != null)
|
|
{
|
|
- byte byteArray[] = text.getBytes();
|
|
- byte byteArray2[] = new byte[byteArray.length + 1];
|
|
- for (int i = 0; i < byteArray.length; i++) {
|
|
- byteArray2[i] = byteArray[i];
|
|
+ os.write(byteArray);
|
|
+ }
|
|
+ }
|
|
+
|
|
+ int max_char(String text) {
|
|
+ int maxc = 0;
|
|
+ char chars[] = text.toCharArray();
|
|
+ for (int n = 0; n < chars.length; n++) {
|
|
+ if ((int) chars[n] > maxc) {
|
|
+ maxc = (int) chars[n];
|
|
}
|
|
- byteArray2[byteArray2.length - 1] = 0;
|
|
- os.write(byteArray2);
|
|
}
|
|
-
|
|
+ return maxc;
|
|
}
|
|
|
|
+ String guess_encoding(char[] chars) {
|
|
+ boolean saw_high_char = false;
|
|
+
|
|
+ for (int i = 0; i < chars.length; i++) {
|
|
+ if (chars[i] == '\0') {
|
|
+ break;
|
|
+ }
|
|
+ if (chars[i] >= 128) {
|
|
+ saw_high_char = true;
|
|
+ break;
|
|
+ }
|
|
+ }
|
|
+ if (!saw_high_char) {
|
|
+ return "ASCII";
|
|
+ }
|
|
+ char prev = 1;
|
|
+ boolean valid_utf8 = true;
|
|
+ int n = 0;
|
|
+ for (int i = 0; i < chars.length; i++) {
|
|
+ if (chars[i] == '\0') {
|
|
+ break;
|
|
+ }
|
|
+ char c = chars[i];
|
|
+ if (prev < 128 && c >= 128) {
|
|
+ if (c >> 5 == 0x6) {
|
|
+ n = 1;
|
|
+ } else if (c >> 4 == 0xe) {
|
|
+ n = 2;
|
|
+ } else if (c >> 3 == 0x1e) {
|
|
+ n = 3;
|
|
+ } else if (c >> 2 == 0x3e) {
|
|
+ n = 4;
|
|
+ } else {
|
|
+ valid_utf8 = false;
|
|
+ break;
|
|
+ }
|
|
+ } else {
|
|
+ if (n > 0) {
|
|
+ if (c < 128) {
|
|
+ valid_utf8 = false;
|
|
+ break;
|
|
+ }
|
|
+ n--;
|
|
+ }
|
|
+ }
|
|
+
|
|
+ prev = c;
|
|
+ }
|
|
+ if (valid_utf8) {
|
|
+ return "UTF-8";
|
|
+ } else {
|
|
+ return "ISO-8859-1";
|
|
+ }
|
|
+ }
|
|
+
|
|
+
|
|
//Internally used. Write an rfb message to the server for sending files ONLY
|
|
int writeRfbFileTransferMsgForSendFile(
|
|
- int contentType,
|
|
- int contentParam,
|
|
- long size,
|
|
- long length,
|
|
- String source
|
|
- ) throws IOException
|
|
+ int contentType,
|
|
+ int contentParam,
|
|
+ long size,
|
|
+ long length,
|
|
+ String source
|
|
+ ) throws IOException
|
|
{
|
|
File f = new File(source);
|
|
fis = new FileInputStream(f);
|
|
@@ -768,50 +913,47 @@
|
|
|
|
while (bytesRead!=-1)
|
|
{
|
|
- counter += bytesRead;
|
|
- myDeflater.setInput(byteBuffer, 0, bytesRead);
|
|
- myDeflater.finish();
|
|
- compressedSize = myDeflater.deflate(CompressionBuffer);
|
|
- myDeflater.reset();
|
|
- // If the compressed data is larger than the original one, we're dealing with
|
|
- // already compressed data
|
|
- if (compressedSize > bytesRead)
|
|
- fCompress = false;
|
|
- this.writeRfbFileTransferMsg(
|
|
- contentType,
|
|
- contentParam,
|
|
- (fCompress ? 1 : 0),
|
|
- (fCompress ? compressedSize-1 : bytesRead-1),
|
|
- null
|
|
- );
|
|
- // Todo: Test write error !
|
|
- os.write(
|
|
- fCompress ? CompressionBuffer : byteBuffer,
|
|
- 0,
|
|
- fCompress ? compressedSize : bytesRead
|
|
- );
|
|
-
|
|
- // Todo: test read error !
|
|
- bytesRead = fis.read(byteBuffer);
|
|
-
|
|
- // viewer.ftp.connectionStatus.setText("Sent: "+ counter + " bytes of "+ f.length() + " bytes");
|
|
- viewer.ftp.jProgressBar.setValue((int)((counter * 100) / f.length()));
|
|
- viewer.ftp.connectionStatus.setText(">>> Sending File: " + source + " - Size: " + f.length() + " bytes - Progress: " + ((counter * 100) / f.length()) + "%");
|
|
-
|
|
- if (fAbort == true)
|
|
- {
|
|
- fAbort = false;
|
|
- fError = true;
|
|
- break;
|
|
- }
|
|
- try
|
|
- {
|
|
- Thread.sleep(5);
|
|
- }
|
|
- catch(InterruptedException e)
|
|
- {
|
|
- System.err.println("Interrupted");
|
|
- }
|
|
+ counter += bytesRead;
|
|
+ myDeflater.setInput(byteBuffer, 0, bytesRead);
|
|
+ myDeflater.finish();
|
|
+ compressedSize = myDeflater.deflate(CompressionBuffer);
|
|
+ myDeflater.reset();
|
|
+ // If the compressed data is larger than the original one, we're dealing with
|
|
+ // already compressed data
|
|
+ if (compressedSize > bytesRead)
|
|
+ fCompress = false;
|
|
+ this.writeRfbFileTransferMsg(
|
|
+ contentType,
|
|
+ contentParam,
|
|
+ (fCompress ? 1 : 0),
|
|
+// RUNGE (fCompress ? compressedSize-1 : bytesRead-1),
|
|
+ (fCompress ? compressedSize : bytesRead),
|
|
+ null
|
|
+ );
|
|
+ // Todo: Test write error !
|
|
+ os.write(fCompress ? CompressionBuffer : byteBuffer, 0, fCompress ? compressedSize : bytesRead);
|
|
+
|
|
+ // Todo: test read error !
|
|
+ bytesRead = fis.read(byteBuffer);
|
|
+
|
|
+ // viewer.ftp.connectionStatus.setText("Sent: "+ counter + " bytes of "+ f.length() + " bytes");
|
|
+ viewer.ftp.jProgressBar.setValue((int)((counter * 100) / f.length()));
|
|
+ viewer.ftp.connectionStatus.setText(">>> Sending File: " + source + " - Size: " + f.length() + " bytes - Progress: " + ((counter * 100) / f.length()) + "%");
|
|
+
|
|
+ if (fAbort == true)
|
|
+ {
|
|
+ fAbort = false;
|
|
+ fError = true;
|
|
+ break;
|
|
+ }
|
|
+ try
|
|
+ {
|
|
+ Thread.sleep(5);
|
|
+ }
|
|
+ catch(InterruptedException e)
|
|
+ {
|
|
+ System.err.println("Interrupted");
|
|
+ }
|
|
}
|
|
|
|
writeRfbFileTransferMsg(fError ? rfbAbortFileTransfer : rfbEndOfFile, 0, 0, 0, null);
|
|
@@ -831,24 +973,30 @@
|
|
{
|
|
System.out.print((char) is.readUnsignedByte());
|
|
}
|
|
+ System.out.println("");
|
|
+
|
|
+ if (size == rfbRErrorCmd || size == -1) {
|
|
+ viewer.ftp.enableButtons();
|
|
+ viewer.ftp.connectionStatus.setText("Remote file not available for writing.");
|
|
+ viewer.ftp.historyComboBox.insertItemAt(new String(" > Error - Remote file not available for writing."), 0);
|
|
+ viewer.ftp.historyComboBox.setSelectedIndex(0);
|
|
+ return;
|
|
+ }
|
|
|
|
- int ret = writeRfbFileTransferMsgForSendFile(
|
|
- rfbFilePacket,
|
|
- 0,
|
|
- 0,
|
|
- 0,
|
|
- sendFileSource);
|
|
+ int ret = writeRfbFileTransferMsgForSendFile(rfbFilePacket, 0, 0, 0, sendFileSource);
|
|
|
|
viewer.ftp.refreshRemoteLocation();
|
|
if (ret != 1)
|
|
{
|
|
viewer.ftp.connectionStatus.setText(" > Error - File NOT sent");
|
|
- viewer.ftp.historyComboBox.insertItemAt(new String(" > Error - File: <" + sendFileSource) + "> was not correctly sent (aborted by user or error)",0);
|
|
+ viewer.ftp.historyComboBox.insertItemAt(new String(" > Error - File: <" + sendFileSource)
|
|
+ + "> was not correctly sent (aborted or error). Data may still be buffered/in transit. Wait for remote listing...",0);
|
|
}
|
|
else
|
|
{
|
|
viewer.ftp.connectionStatus.setText(" > File sent");
|
|
- viewer.ftp.historyComboBox.insertItemAt(new String(" > File: <" + sendFileSource) + "> was sent to Remote Machine",0);
|
|
+ viewer.ftp.historyComboBox.insertItemAt(new String(" > File: <" + sendFileSource)
|
|
+ + "> was sent to Remote Machine. Note: data may still be buffered/in transit. Wait for remote listing...",0);
|
|
}
|
|
viewer.ftp.historyComboBox.setSelectedIndex(0);
|
|
viewer.ftp.enableButtons();
|
|
@@ -907,7 +1055,7 @@
|
|
//Handles acknowledgement that the file has been deleted on the server
|
|
void deleteRemoteFileFeedback() throws IOException
|
|
{
|
|
- is.readInt();
|
|
+ int ret = is.readInt();
|
|
int length = is.readInt();
|
|
String f = "";
|
|
for (int i = 0; i < length; i++)
|
|
@@ -916,7 +1064,11 @@
|
|
}
|
|
|
|
viewer.ftp.refreshRemoteLocation();
|
|
- viewer.ftp.historyComboBox.insertItemAt(new String(" > Deleted File On Remote Machine: " + f.substring(0, f.length()-1)),0);
|
|
+ if (ret == -1) {
|
|
+ viewer.ftp.historyComboBox.insertItemAt(new String(" > ERROR Could not Delete File On Remote Machine: "),0);
|
|
+ } else {
|
|
+ viewer.ftp.historyComboBox.insertItemAt(new String(" > Deleted File On Remote Machine: " + f.substring(0, f.length()-1)),0);
|
|
+ }
|
|
viewer.ftp.historyComboBox.setSelectedIndex(0);
|
|
}
|
|
|
|
@@ -926,12 +1078,7 @@
|
|
try
|
|
{
|
|
String temp = text;
|
|
- writeRfbFileTransferMsg(
|
|
- rfbCommand,
|
|
- rfbCFileDelete,
|
|
- 0,
|
|
- temp.length(),
|
|
- temp);
|
|
+ writeRfbFileTransferMsg(rfbCommand, rfbCFileDelete, 0, temp.length(), temp);
|
|
}
|
|
catch (IOException e)
|
|
{
|
|
@@ -943,7 +1090,7 @@
|
|
// Handles acknowledgement that the directory has been created on the server
|
|
void createRemoteDirectoryFeedback() throws IOException
|
|
{
|
|
- is.readInt();
|
|
+ int ret = is.readInt();
|
|
int length = is.readInt();
|
|
String f="";
|
|
for (int i = 0; i < length; i++)
|
|
@@ -951,7 +1098,11 @@
|
|
f += (char)is.readUnsignedByte();
|
|
}
|
|
viewer.ftp.refreshRemoteLocation();
|
|
- viewer.ftp.historyComboBox.insertItemAt(new String(" > Created Directory on Remote Machine: " + f.substring(0, f.length()-1)),0);
|
|
+ if (ret == -1) {
|
|
+ viewer.ftp.historyComboBox.insertItemAt(new String(" > ERROR Could not Create Directory on Remote Machine."),0);
|
|
+ } else {
|
|
+ viewer.ftp.historyComboBox.insertItemAt(new String(" > Created Directory on Remote Machine: " + f.substring(0, f.length()-1)),0);
|
|
+ }
|
|
viewer.ftp.historyComboBox.setSelectedIndex(0);
|
|
}
|
|
|
|
@@ -961,12 +1112,7 @@
|
|
try
|
|
{
|
|
String temp = text;
|
|
- writeRfbFileTransferMsg(
|
|
- rfbCommand,
|
|
- rfbCDirCreate,
|
|
- 0,
|
|
- temp.length(),
|
|
- temp);
|
|
+ writeRfbFileTransferMsg(rfbCommand, rfbCDirCreate, 0, temp.length(), temp);
|
|
}
|
|
catch (IOException e)
|
|
{
|
|
@@ -979,15 +1125,13 @@
|
|
{
|
|
try
|
|
{
|
|
+//System.out.println("requestRemoteFile text: " + text);
|
|
+//System.out.println("requestRemoteFile leng: " + text.length());
|
|
String temp = text;
|
|
receivePath = localPath;
|
|
|
|
- writeRfbFileTransferMsg(
|
|
- rfbFileTransferRequest,
|
|
- 0,
|
|
- 1, // 0 : compression not supported - 1 : compression supported
|
|
- temp.length(),
|
|
- temp);
|
|
+ // 0 : compression not supported - 1 : compression supported
|
|
+ writeRfbFileTransferMsg(rfbFileTransferRequest, 0, 1, temp.length(), temp);
|
|
}
|
|
catch (IOException e)
|
|
{
|
|
@@ -1004,6 +1148,9 @@
|
|
viewer.ftp.disableButtons();
|
|
int size = is.readInt();
|
|
int length = is.readInt();
|
|
+
|
|
+//System.out.println("receiveFileHeader size: " + size);
|
|
+//System.out.println("receiveFileHeader leng: " + length);
|
|
|
|
String tempName = "";
|
|
for (int i = 0; i < length; i++)
|
|
@@ -1011,6 +1158,15 @@
|
|
tempName += (char) is.readUnsignedByte();
|
|
}
|
|
|
|
+ if (size == rfbRErrorCmd || size == -1) {
|
|
+ fFileReceptionRunning = false;
|
|
+ viewer.ftp.enableButtons();
|
|
+ viewer.ftp.connectionStatus.setText("Remote file not available for reading.");
|
|
+ viewer.ftp.historyComboBox.insertItemAt(new String(" > Error - Remote file not available for reading."), 0);
|
|
+ viewer.ftp.historyComboBox.setSelectedIndex(0);
|
|
+ return;
|
|
+ }
|
|
+
|
|
// sf@2004 - Read the high part of file size (not yet in rfbFileTransferMsg for
|
|
// backward compatibility reasons...)
|
|
int sizeH = is.readInt();
|
|
@@ -1021,7 +1177,16 @@
|
|
fileSize=0;
|
|
fileChunkCounter = 0;
|
|
String fileName = receivePath;
|
|
- fos = new FileOutputStream(fileName);
|
|
+ try {
|
|
+ fos = new FileOutputStream(fileName);
|
|
+ } catch (Exception e) {
|
|
+ fFileReceptionRunning = false;
|
|
+ writeRfbFileTransferMsg(rfbAbortFileTransfer, 0, 0, 0, null);
|
|
+ viewer.ftp.historyComboBox.insertItemAt(new String(" > ERROR opening Local File: <" + fileName ),0);
|
|
+ viewer.ftp.historyComboBox.setSelectedIndex(0);
|
|
+ viewer.ftp.enableButtons();
|
|
+ return;
|
|
+ }
|
|
writeRfbFileTransferMsg(rfbFileHeader, 0, 0, 0, null);
|
|
}
|
|
|
|
@@ -1085,7 +1250,13 @@
|
|
fAbort = false;
|
|
fFileReceptionError = true;
|
|
writeRfbFileTransferMsg(rfbAbortFileTransfer, 0, 0, 0, null);
|
|
-
|
|
+
|
|
+ //runge for use with x11vnc/libvncserver, no rfbAbortFileTransfer reply sent.
|
|
+ try {Thread.sleep(500);} catch (InterruptedException e) {}
|
|
+ viewer.ftp.enableButtons();
|
|
+ viewer.ftp.refreshLocalLocation();
|
|
+ viewer.ftp.connectionStatus.setText(" > Error - File NOT received");
|
|
+ viewer.ftp.historyComboBox.insertItemAt(new String(" > Error - File: <" + receivePath + "> not correctly received from Remote Machine (aborted by user or error)") ,0);
|
|
}
|
|
// sf@2004 - For old FT protocole only
|
|
/*
|
|
@@ -1104,7 +1275,7 @@
|
|
int length = is.readInt();
|
|
fileSize=0;
|
|
fos.close();
|
|
-
|
|
+
|
|
viewer.ftp.refreshLocalLocation();
|
|
if (fReceptionOk && !fFileReceptionError)
|
|
{
|
|
@@ -1132,12 +1303,7 @@
|
|
try
|
|
{
|
|
String temp = text;
|
|
- writeRfbFileTransferMsg(
|
|
- rfbDirContentRequest,
|
|
- rfbRDirContent,
|
|
- 0,
|
|
- temp.length(),
|
|
- temp);
|
|
+ writeRfbFileTransferMsg(rfbDirContentRequest, rfbRDirContent, 0, temp.length(), temp);
|
|
}
|
|
catch (IOException e)
|
|
{
|
|
@@ -1197,11 +1363,80 @@
|
|
str += temp;
|
|
}
|
|
}
|
|
+ // runge
|
|
+ viewer.ftp.receivedRemoteDirectoryName(str);
|
|
// viewer.ftp.changeRemoteDirectory(str);
|
|
|
|
}
|
|
}
|
|
|
|
+ int zogswap(int n) {
|
|
+ long l = n;
|
|
+ if (l < 0) {
|
|
+ l += 0x100000000L;
|
|
+ }
|
|
+ l = l & 0xFFFFFFFF;
|
|
+ l = (l >> 24) | ((l & 0x00ff0000) >> 8) | ((l & 0x0000ff00) << 8) | (l << 24);
|
|
+ return (int) l;
|
|
+ }
|
|
+
|
|
+ int windozeToUnix(int L, int H) {
|
|
+ long L2 = zogswap(L);
|
|
+ long H2 = zogswap(H);
|
|
+ long unix = (H2 << 32) + L2;
|
|
+ unix -= 11644473600L * 10000000L;
|
|
+ unix /= 10000000L;
|
|
+ //System.out.println("unix time: " + unix + " H2: " + H2 + " L2: " + L2);
|
|
+ return (int) unix;
|
|
+ }
|
|
+
|
|
+ String timeStr(int t, int h) {
|
|
+ if (h == 0) {
|
|
+ // x11vnc/libvncserver unix
|
|
+ t = zogswap(t);
|
|
+ } else {
|
|
+ // ultra (except if h==0 by chance)
|
|
+ t = windozeToUnix(t, h);
|
|
+ }
|
|
+ long tl = (long) t;
|
|
+ Date date = new Date(tl * 1000);
|
|
+ if (true) {
|
|
+ return date.toString();
|
|
+ } else {
|
|
+ return DateFormat.getDateTimeInstance().format(date);
|
|
+ }
|
|
+ }
|
|
+
|
|
+ String dotPast(double f, int n) {
|
|
+ String fs = "" + f;
|
|
+ int i = fs.lastIndexOf(".") + n;
|
|
+ if (i >= 0) {
|
|
+ int len = fs.length();
|
|
+ if (i >= len) {
|
|
+ i = len-1;
|
|
+ }
|
|
+ fs = fs.substring(0, i);
|
|
+ }
|
|
+ return fs;
|
|
+ }
|
|
+ String sizeStr(int s) {
|
|
+ s = zogswap(s);
|
|
+ if (s < 0) {
|
|
+ return s + "? B";
|
|
+ } else if (s < 1024) {
|
|
+ return s + " B";
|
|
+ } else if (s < 1024 * 1024) {
|
|
+ double k = s / 1024.0;
|
|
+ String ks = dotPast(k, 3);
|
|
+
|
|
+ return s + " (" + ks + " KB)";
|
|
+ } else {
|
|
+ double m = s / (1024.0*1024.0);
|
|
+ String ms = dotPast(m, 3);
|
|
+ return s + " (" + ms + " MB)";
|
|
+ }
|
|
+ }
|
|
+
|
|
//Internally used to receive directory content from server
|
|
//Here, the server sends one file/directory with it's attributes
|
|
void readFTPMsgDirectoryListContent() throws IOException
|
|
@@ -1217,17 +1452,32 @@
|
|
dwReserved0,
|
|
dwReserved1;
|
|
long ftCreationTime, ftLastAccessTime, ftLastWriteTime;
|
|
+ int ftCreationTimeL, ftLastAccessTimeL, ftLastWriteTimeL;
|
|
+ int ftCreationTimeH, ftLastAccessTimeH, ftLastWriteTimeH;
|
|
char cFileName, cAlternateFileName;
|
|
int length = 0;
|
|
is.readInt();
|
|
length = is.readInt();
|
|
+
|
|
+ char[] chars = new char[4*length];
|
|
+ int char_cnt = 0;
|
|
+ for (int i = 0; i < chars.length; i++) {
|
|
+ chars[i] = '\0';
|
|
+ }
|
|
+
|
|
dwFileAttributes = is.readInt();
|
|
length -= 4;
|
|
- ftCreationTime = is.readLong();
|
|
+ //ftCreationTime = is.readLong();
|
|
+ ftCreationTimeL = is.readInt();
|
|
+ ftCreationTimeH = is.readInt();
|
|
length -= 8;
|
|
- ftLastAccessTime = is.readLong();
|
|
+ //ftLastAccessTime = is.readLong();
|
|
+ ftLastAccessTimeL = is.readInt();
|
|
+ ftLastAccessTimeH = is.readInt();
|
|
length -= 8;
|
|
- ftLastWriteTime = is.readLong();
|
|
+ //ftLastWriteTime = is.readLong();
|
|
+ ftLastWriteTimeL = is.readInt();
|
|
+ ftLastWriteTimeH = is.readInt();
|
|
length -= 8;
|
|
nFileSizeHigh = is.readInt();
|
|
length -= 4;
|
|
@@ -1239,10 +1489,12 @@
|
|
length -= 4;
|
|
cFileName = (char) is.readUnsignedByte();
|
|
length--;
|
|
+ chars[char_cnt++] = cFileName;
|
|
while (cFileName != '\0')
|
|
{
|
|
fileName += cFileName;
|
|
cFileName = (char) is.readUnsignedByte();
|
|
+ chars[char_cnt++] = cFileName;
|
|
length--;
|
|
}
|
|
cAlternateFileName = (char) is.readByte();
|
|
@@ -1253,7 +1505,28 @@
|
|
cAlternateFileName = (char) is.readUnsignedByte();
|
|
length--;
|
|
}
|
|
- if (dwFileAttributes == 268435456
|
|
+ String guessed = guess_encoding(chars);
|
|
+ if (!guessed.equals("ASCII")) {
|
|
+ System.out.println("guess: " + guessed + "\t" + fileName);
|
|
+ }
|
|
+ if (guessed.equals("UTF-8")) {
|
|
+ try {
|
|
+ byte[] bytes = new byte[char_cnt-1];
|
|
+ for (int i=0; i < char_cnt-1; i++) {
|
|
+ bytes[i] = (byte) chars[i];
|
|
+ }
|
|
+ String newstr = new String(bytes, "UTF-8");
|
|
+ fileName = newstr;
|
|
+ } catch (Exception e) {
|
|
+ System.out.println("failed to convert bytes to UTF-8 based string");
|
|
+ }
|
|
+ }
|
|
+ for (int i = 0; i < char_cnt; i++) {
|
|
+ //System.out.println("char[" + i + "]\t" + (int) chars[i]);
|
|
+ }
|
|
+ if (fileName.length() <= 0) {
|
|
+ ;
|
|
+ } else if (dwFileAttributes == 268435456
|
|
|| dwFileAttributes == 369098752
|
|
|| dwFileAttributes == 285212672
|
|
|| dwFileAttributes == 271056896
|
|
@@ -1263,11 +1536,74 @@
|
|
|| dwFileAttributes == 369623040)
|
|
{
|
|
fileName = " [" + fileName + "]";
|
|
- remoteDirsList.add(fileName); // sf@2004
|
|
- }
|
|
- else
|
|
- {
|
|
- remoteFilesList.add(" " + fileName); // sf@2004
|
|
+// begin runge/x11vnc
|
|
+// remoteDirsList.add(fileName); // sf@2004
|
|
+ int i = -1;
|
|
+ String t1 = fileName.toLowerCase();
|
|
+ for (int j = 0; j < remoteDirsList.size(); j++) {
|
|
+ String t = (String) remoteDirsList.get(j);
|
|
+ String t2 = t.toLowerCase();
|
|
+ if (t1.compareTo(t2) < 0) {
|
|
+ i = j;
|
|
+ break;
|
|
+ }
|
|
+ }
|
|
+ //String s = "Lastmod: " + timeStr(ftLastWriteTimeL, ftLastWriteTimeH) + " " + fileName;
|
|
+ String f2 = fileName;
|
|
+ if (f2.length() < 24) {
|
|
+ for (int ik = f2.length(); ik < 24; ik++) {
|
|
+ f2 = f2 + " ";
|
|
+ }
|
|
+ }
|
|
+ String s = f2 + " \tLastmod: " + timeStr(ftLastWriteTimeL, ftLastWriteTimeH) + " \t\tSize: " + sizeStr(nFileSizeLow);
|
|
+ //s = fileName + " Lastmod: " + zogswap(ftLastWriteTimeL);
|
|
+ if (i >= 0) {
|
|
+ remoteDirsList.add(i, fileName);
|
|
+ remoteDirsListInfo.add(i, s);
|
|
+ } else {
|
|
+ remoteDirsList.add(fileName);
|
|
+ remoteDirsListInfo.add(s);
|
|
+ }
|
|
+// end runge/x11vnc
|
|
+ } else {
|
|
+// begin runge/x11vnc
|
|
+// remoteFilesList.add(" " + fileName); // sf@2004
|
|
+
|
|
+ fileName = " " + fileName;
|
|
+ int i = -1;
|
|
+ String t1 = fileName.toLowerCase();
|
|
+ for (int j = 0; j < remoteFilesList.size(); j++) {
|
|
+ String t = (String) remoteFilesList.get(j);
|
|
+ String t2 = t.toLowerCase();
|
|
+ if (t1.compareTo(t2) < 0) {
|
|
+ i = j;
|
|
+ break;
|
|
+ }
|
|
+ }
|
|
+ String f2 = fileName;
|
|
+ if (f2.length() < 24) {
|
|
+ for (int ik = f2.length(); ik < 24; ik++) {
|
|
+ f2 = f2 + " ";
|
|
+ }
|
|
+ }
|
|
+
|
|
+if (false) {
|
|
+System.out.println("fileName: " + f2);
|
|
+System.out.println("ftLastWriteTimeL: " + ftLastWriteTimeL);
|
|
+System.out.println("ftLastWriteTimeH: " + ftLastWriteTimeH);
|
|
+System.out.println("nFileSizeLow: " + nFileSizeLow);
|
|
+}
|
|
+
|
|
+ String s = f2 + " \tLastmod: " + timeStr(ftLastWriteTimeL, ftLastWriteTimeH) + " \t\tSize: " + sizeStr(nFileSizeLow);
|
|
+ //s = fileName + " Lastmod: " + ftLastWriteTimeL + "/" + zogswap(ftLastWriteTimeL) + " Size: " + nFileSizeLow + "/" + zogswap(nFileSizeLow);
|
|
+ if (i >= 0) {
|
|
+ remoteFilesList.add(i, fileName);
|
|
+ remoteFilesListInfo.add(i, s);
|
|
+ } else {
|
|
+ remoteFilesList.add(fileName);
|
|
+ remoteFilesListInfo.add(s);
|
|
+ }
|
|
+// end runge/x11vnc
|
|
}
|
|
|
|
// a.add(fileName);
|
|
@@ -1282,14 +1618,32 @@
|
|
|
|
// sf@2004
|
|
a.clear();
|
|
- for (int i = 0; i < remoteDirsList.size(); i++)
|
|
+ b.clear();
|
|
+ for (int i = 0; i < remoteDirsList.size(); i++) {
|
|
a.add(remoteDirsList.get(i));
|
|
- for (int i = 0; i < remoteFilesList.size(); i++)
|
|
+ b.add(remoteDirsListInfo.get(i));
|
|
+ }
|
|
+ for (int i = 0; i < remoteFilesList.size(); i++) {
|
|
a.add(remoteFilesList.get(i));
|
|
+
|
|
+ b.add(remoteFilesListInfo.get(i));
|
|
+ }
|
|
remoteDirsList.clear();
|
|
+ remoteDirsListInfo.clear();
|
|
remoteFilesList.clear();
|
|
+ remoteFilesListInfo.clear();
|
|
|
|
- viewer.ftp.printDirectory(a);
|
|
+// begin runge/x11vnc
|
|
+ // Hack for double listing at startup... probably libvncserver bug..
|
|
+ readServerDriveListCnt++;
|
|
+ if (readServerDriveListCnt == 2) {
|
|
+ if (System.currentTimeMillis() - readServerDriveListTime < 2000) {
|
|
+//System.out.println("readServerDriveListCnt skip " + readServerDriveListCnt);
|
|
+ return;
|
|
+ }
|
|
+ }
|
|
+// end runge/x11vnc
|
|
+ viewer.ftp.printDirectory(a, b);
|
|
}
|
|
|
|
//Internally used to signify the drive requested is not ready
|
|
@@ -1299,6 +1653,8 @@
|
|
System.out.println("Remote Drive unavailable");
|
|
viewer.ftp.connectionStatus.setText(" > WARNING - Remote Drive unavailable (possibly restricted access or media not present)");
|
|
viewer.ftp.remoteStatus.setText("WARNING: Remote Drive unavailable");
|
|
+ viewer.ftp.historyComboBox.insertItemAt(new String(" > WARNING: Remote Drive unavailable."), 0);
|
|
+ viewer.ftp.historyComboBox.setSelectedIndex(0);
|
|
}
|
|
|
|
//Call this method to request the list of drives on the server.
|
|
@@ -1306,12 +1662,11 @@
|
|
{
|
|
try
|
|
{
|
|
- viewer.rfb.writeRfbFileTransferMsg(
|
|
- RfbProto.rfbDirContentRequest,
|
|
- RfbProto.rfbRDrivesList,
|
|
- 0,
|
|
- 0,
|
|
- null);
|
|
+ viewer.rfb.writeRfbFileTransferMsg(RfbProto.rfbDirContentRequest, RfbProto.rfbRDrivesList, 0, 0, null);
|
|
+// begin runge/x11vnc
|
|
+ readServerDriveListCnt = 0;
|
|
+ readServerDriveListTime = System.currentTimeMillis();
|
|
+// end runge/x11vnc
|
|
}
|
|
catch (IOException e)
|
|
{
|
|
@@ -1355,21 +1710,21 @@
|
|
int h,
|
|
boolean incremental)
|
|
throws IOException {
|
|
- if (!viewer.ftp.isVisible()) {
|
|
- byte[] b = new byte[10];
|
|
+ if (!viewer.ftp.isVisible()) {
|
|
+ byte[] b = new byte[10];
|
|
|
|
- b[0] = (byte) FramebufferUpdateRequest;
|
|
- b[1] = (byte) (incremental ? 1 : 0);
|
|
- b[2] = (byte) ((x >> 8) & 0xff);
|
|
- b[3] = (byte) (x & 0xff);
|
|
- b[4] = (byte) ((y >> 8) & 0xff);
|
|
- b[5] = (byte) (y & 0xff);
|
|
- b[6] = (byte) ((w >> 8) & 0xff);
|
|
- b[7] = (byte) (w & 0xff);
|
|
- b[8] = (byte) ((h >> 8) & 0xff);
|
|
- b[9] = (byte) (h & 0xff);
|
|
+ b[0] = (byte) FramebufferUpdateRequest;
|
|
+ b[1] = (byte) (incremental ? 1 : 0);
|
|
+ b[2] = (byte) ((x >> 8) & 0xff);
|
|
+ b[3] = (byte) (x & 0xff);
|
|
+ b[4] = (byte) ((y >> 8) & 0xff);
|
|
+ b[5] = (byte) (y & 0xff);
|
|
+ b[6] = (byte) ((w >> 8) & 0xff);
|
|
+ b[7] = (byte) (w & 0xff);
|
|
+ b[8] = (byte) ((h >> 8) & 0xff);
|
|
+ b[9] = (byte) (h & 0xff);
|
|
|
|
- os.write(b);
|
|
+ os.write(b);
|
|
}
|
|
}
|
|
|
|
@@ -1482,7 +1837,13 @@
|
|
b[6] = (byte) ((text.length() >> 8) & 0xff);
|
|
b[7] = (byte) (text.length() & 0xff);
|
|
|
|
- System.arraycopy(text.getBytes(), 0, b, 8, text.length());
|
|
+ if (false && max_char(text) > 255) {
|
|
+ System.arraycopy(text.getBytes("UTF-8"), 0, b, 8, text.length());
|
|
+ } else if (max_char(text) > 127) {
|
|
+ System.arraycopy(text.getBytes("ISO-8859-1"), 0, b, 8, text.length());
|
|
+ } else {
|
|
+ System.arraycopy(text.getBytes(), 0, b, 8, text.length());
|
|
+ }
|
|
|
|
os.write(b);
|
|
// }
|
|
@@ -1506,6 +1867,37 @@
|
|
final static int META_MASK = InputEvent.META_MASK;
|
|
final static int ALT_MASK = InputEvent.ALT_MASK;
|
|
|
|
+ void writeWheelEvent(MouseWheelEvent evt) throws IOException {
|
|
+ eventBufLen = 0;
|
|
+
|
|
+ int x = evt.getX();
|
|
+ int y = evt.getY();
|
|
+
|
|
+ if (x < 0) x = 0;
|
|
+ if (y < 0) y = 0;
|
|
+
|
|
+ int ptrmask;
|
|
+
|
|
+ int clicks = evt.getWheelRotation();
|
|
+ System.out.println("writeWheelEvent: clicks: " + clicks);
|
|
+ if (clicks > 0) {
|
|
+ ptrmask = 16;
|
|
+ } else if (clicks < 0) {
|
|
+ ptrmask = 8;
|
|
+ } else {
|
|
+ return;
|
|
+ }
|
|
+
|
|
+ eventBuf[eventBufLen++] = (byte) PointerEvent;
|
|
+ eventBuf[eventBufLen++] = (byte) ptrmask;
|
|
+ eventBuf[eventBufLen++] = (byte) ((x >> 8) & 0xff);
|
|
+ eventBuf[eventBufLen++] = (byte) (x & 0xff);
|
|
+ eventBuf[eventBufLen++] = (byte) ((y >> 8) & 0xff);
|
|
+ eventBuf[eventBufLen++] = (byte) (y & 0xff);
|
|
+
|
|
+ os.write(eventBuf, 0, eventBufLen);
|
|
+ }
|
|
+
|
|
//
|
|
// Write a pointer event message. We may need to send modifier key events
|
|
// around it to set the correct modifier state.
|
|
@@ -1610,6 +2002,21 @@
|
|
|
|
boolean down = (evt.getID() == KeyEvent.KEY_PRESSED);
|
|
|
|
+ if (viewer.debugKeyboard) {
|
|
+ System.out.println("----------------------------------------");
|
|
+ System.out.println("evt.getKeyChar: " + evt.getKeyChar());
|
|
+ System.out.println("getKeyText: " + KeyEvent.getKeyText(evt.getKeyCode()));
|
|
+ System.out.println("evt.getKeyCode: " + evt.getKeyCode());
|
|
+ System.out.println("evt.getID: " + evt.getID());
|
|
+ System.out.println("evt.getKeyLocation: " + evt.getKeyLocation());
|
|
+ System.out.println("evt.isActionKey: " + evt.isActionKey());
|
|
+ System.out.println("evt.isControlDown: " + evt.isControlDown());
|
|
+ System.out.println("evt.getModifiers: " + evt.getModifiers());
|
|
+ System.out.println("getKeyModifiersText: " + KeyEvent.getKeyModifiersText(evt.getModifiers()));
|
|
+ System.out.println("evt.paramString: " + evt.paramString());
|
|
+ }
|
|
+
|
|
+
|
|
int key;
|
|
if (evt.isActionKey()) {
|
|
|
|
@@ -1685,6 +2092,9 @@
|
|
default :
|
|
return;
|
|
}
|
|
+ if (key == 0xffc2 && viewer.mapF5_to_atsign) {
|
|
+ key = 0x40;
|
|
+ }
|
|
|
|
} else {
|
|
|
|
@@ -1794,6 +2204,16 @@
|
|
int oldModifiers = 0;
|
|
|
|
void writeModifierKeyEvents(int newModifiers) {
|
|
+ if(viewer.forbid_Ctrl_Alt) {
|
|
+ if ((newModifiers & CTRL_MASK) != 0 && (newModifiers & ALT_MASK) != 0) {
|
|
+ int orig = newModifiers;
|
|
+ newModifiers &= ~ALT_MASK;
|
|
+ newModifiers &= ~CTRL_MASK;
|
|
+ if (viewer.debugKeyboard) {
|
|
+ System.out.println("Ctrl+Alt modifiers: " + orig + " -> " + newModifiers);
|
|
+ }
|
|
+ }
|
|
+ }
|
|
if ((newModifiers & CTRL_MASK) != (oldModifiers & CTRL_MASK))
|
|
writeKeyEvent(0xffe3, (newModifiers & CTRL_MASK) != 0);
|
|
|
|
diff -Naur JavaViewer.orig/SSLSocketToMe.java JavaViewer/SSLSocketToMe.java
|
|
--- JavaViewer.orig/SSLSocketToMe.java 1969-12-31 19:00:00.000000000 -0500
|
|
+++ JavaViewer/SSLSocketToMe.java 2010-07-10 19:18:06.000000000 -0400
|
|
@@ -0,0 +1,2067 @@
|
|
+/*
|
|
+ * SSLSocketToMe.java: add SSL encryption to Java VNC Viewer.
|
|
+ *
|
|
+ * Copyright (c) 2006 Karl J. Runge <runge@karlrunge.com>
|
|
+ * All rights reserved.
|
|
+ *
|
|
+ * This is free software; you can redistribute it and/or modify
|
|
+ * it under the terms of the GNU General Public License as published by
|
|
+ * the Free Software Foundation; version 2 of the License, or
|
|
+ * (at your option) any later version.
|
|
+ *
|
|
+ * This software is distributed in the hope that it will be useful,
|
|
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
+ * GNU General Public License for more details.
|
|
+ *
|
|
+ * You should have received a copy of the GNU General Public License
|
|
+ * along with this software; if not, write to the Free Software
|
|
+ * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307,
|
|
+ * USA.
|
|
+ *
|
|
+ */
|
|
+
|
|
+import java.net.*;
|
|
+import java.io.*;
|
|
+import javax.net.ssl.*;
|
|
+import java.util.*;
|
|
+
|
|
+import java.security.*;
|
|
+import java.security.cert.*;
|
|
+import java.security.spec.*;
|
|
+import java.security.cert.Certificate;
|
|
+import java.security.cert.CertificateFactory;
|
|
+
|
|
+import java.awt.*;
|
|
+import java.awt.event.*;
|
|
+
|
|
+public class SSLSocketToMe {
|
|
+
|
|
+ /* basic member data: */
|
|
+ String host;
|
|
+ int port;
|
|
+ VncViewer viewer;
|
|
+
|
|
+ boolean debug = true;
|
|
+ boolean debug_certs = false;
|
|
+
|
|
+ /* sockets */
|
|
+ SSLSocket socket = null;
|
|
+ SSLSocketFactory factory;
|
|
+
|
|
+ /* fallback for Proxy connection */
|
|
+ boolean proxy_in_use = false;
|
|
+ boolean proxy_failure = false;
|
|
+ public DataInputStream is = null;
|
|
+ public OutputStream os = null;
|
|
+
|
|
+ /* strings from user WRT proxy: */
|
|
+ String proxy_auth_string = null;
|
|
+ String proxy_dialog_host = null;
|
|
+ int proxy_dialog_port = 0;
|
|
+
|
|
+ Socket proxySock;
|
|
+ DataInputStream proxy_is;
|
|
+ OutputStream proxy_os;
|
|
+
|
|
+ /* trust contexts */
|
|
+ SSLContext trustloc_ctx;
|
|
+ SSLContext trustall_ctx;
|
|
+ SSLContext trustsrv_ctx;
|
|
+ SSLContext trusturl_ctx;
|
|
+ SSLContext trustone_ctx;
|
|
+
|
|
+ /* corresponding trust managers */
|
|
+ TrustManager[] trustAllCerts;
|
|
+ TrustManager[] trustSrvCert;
|
|
+ TrustManager[] trustUrlCert;
|
|
+ TrustManager[] trustOneCert;
|
|
+
|
|
+ /* client-side SSL auth key (oneTimeKey=...) */
|
|
+ KeyManager[] mykey = null;
|
|
+
|
|
+ boolean user_wants_to_see_cert = true;
|
|
+ String cert_fail = null;
|
|
+
|
|
+ /* cert(s) we retrieve from Web server, VNC server, or serverCert param: */
|
|
+ java.security.cert.Certificate[] trustallCerts = null;
|
|
+ java.security.cert.Certificate[] trustsrvCerts = null;
|
|
+ java.security.cert.Certificate[] trusturlCerts = null;
|
|
+
|
|
+ /* utility to decode hex oneTimeKey=... and serverCert=... */
|
|
+ byte[] hex2bytes(String s) {
|
|
+ byte[] bytes = new byte[s.length()/2];
|
|
+ for (int i=0; i<s.length()/2; i++) {
|
|
+ int j = 2*i;
|
|
+ try {
|
|
+ int val = Integer.parseInt(s.substring(j, j+2), 16);
|
|
+ if (val > 127) {
|
|
+ val -= 256;
|
|
+ }
|
|
+ Integer I = new Integer(val);
|
|
+ bytes[i] = Byte.decode(I.toString()).byteValue();
|
|
+
|
|
+ } catch (Exception e) {
|
|
+ ;
|
|
+ }
|
|
+ }
|
|
+ return bytes;
|
|
+ }
|
|
+
|
|
+ SSLSocketToMe(String h, int p, VncViewer v) throws Exception {
|
|
+ host = h;
|
|
+ port = p;
|
|
+ viewer = v;
|
|
+
|
|
+ debug_certs = v.debugCerts;
|
|
+
|
|
+ /* we will first try default factory for certification: */
|
|
+
|
|
+ factory = (SSLSocketFactory) SSLSocketFactory.getDefault();
|
|
+
|
|
+ dbg("SSL startup: " + host + " " + port);
|
|
+
|
|
+
|
|
+ /* create trust managers to be used if initial handshake fails: */
|
|
+
|
|
+ trustAllCerts = new TrustManager[] {
|
|
+ /*
|
|
+ * this one accepts everything. Only used if user
|
|
+ * has disabled checking (trustAllVncCerts=yes)
|
|
+ * or when we grab the cert to show it to them in
|
|
+ * a dialog and ask them to manually verify/accept it.
|
|
+ */
|
|
+ new X509TrustManager() {
|
|
+ public java.security.cert.X509Certificate[]
|
|
+ getAcceptedIssuers() {
|
|
+ return null;
|
|
+ }
|
|
+ public void checkClientTrusted(
|
|
+ java.security.cert.X509Certificate[] certs,
|
|
+ String authType) {
|
|
+ /* empty */
|
|
+ }
|
|
+ public void checkServerTrusted(
|
|
+ java.security.cert.X509Certificate[] certs,
|
|
+ String authType) {
|
|
+ /* empty */
|
|
+ dbg("ALL: an untrusted connect to grab cert.");
|
|
+ }
|
|
+ }
|
|
+ };
|
|
+
|
|
+ trustUrlCert = new TrustManager[] {
|
|
+ /*
|
|
+ * this one accepts only the retrieved server
|
|
+ * cert by SSLSocket by this applet and stored in
|
|
+ * trusturlCerts.
|
|
+ */
|
|
+ new X509TrustManager() {
|
|
+ public java.security.cert.X509Certificate[]
|
|
+ getAcceptedIssuers() {
|
|
+ return null;
|
|
+ }
|
|
+ public void checkClientTrusted(
|
|
+ java.security.cert.X509Certificate[] certs,
|
|
+ String authType) throws CertificateException {
|
|
+ throw new CertificateException("No Clients (URL)");
|
|
+ }
|
|
+ public void checkServerTrusted(
|
|
+ java.security.cert.X509Certificate[] certs,
|
|
+ String authType) throws CertificateException {
|
|
+ /* we want to check 'certs' against 'trusturlCerts' */
|
|
+ if (trusturlCerts == null) {
|
|
+ throw new CertificateException(
|
|
+ "No Trust url Certs array.");
|
|
+ }
|
|
+ if (trusturlCerts.length < 1) {
|
|
+ throw new CertificateException(
|
|
+ "No Trust url Certs.");
|
|
+ }
|
|
+ if (certs == null) {
|
|
+ throw new CertificateException(
|
|
+ "No this-certs array.");
|
|
+ }
|
|
+ if (certs.length < 1) {
|
|
+ throw new CertificateException(
|
|
+ "No this-certs Certs.");
|
|
+ }
|
|
+ if (certs.length != trusturlCerts.length) {
|
|
+ throw new CertificateException(
|
|
+ "certs.length != trusturlCerts.length " + certs.length + " " + trusturlCerts.length);
|
|
+ }
|
|
+ boolean ok = true;
|
|
+ for (int i = 0; i < certs.length; i++) {
|
|
+ if (! trusturlCerts[i].equals(certs[i])) {
|
|
+ ok = false;
|
|
+ dbg("URL: cert mismatch at i=" + i);
|
|
+ dbg("URL: cert mismatch cert" + certs[i]);
|
|
+ dbg("URL: cert mismatch url" + trusturlCerts[i]);
|
|
+ if (cert_fail == null) {
|
|
+ cert_fail = "cert-mismatch";
|
|
+ }
|
|
+ }
|
|
+ if (debug_certs) {
|
|
+ dbg("\n***********************************************");
|
|
+ dbg("URL: cert info at i=" + i);
|
|
+ dbg("URL: cert info cert" + certs[i]);
|
|
+ dbg("===============================================");
|
|
+ dbg("URL: cert info url" + trusturlCerts[i]);
|
|
+ dbg("***********************************************");
|
|
+ }
|
|
+ }
|
|
+ if (!ok) {
|
|
+ throw new CertificateException(
|
|
+ "Server Cert Chain != URL Cert Chain.");
|
|
+ }
|
|
+ dbg("URL: trusturlCerts[i] matches certs[i] i=0:" + (certs.length-1));
|
|
+ }
|
|
+ }
|
|
+ };
|
|
+
|
|
+ trustSrvCert = new TrustManager[] {
|
|
+ /*
|
|
+ * this one accepts cert given to us in the serverCert
|
|
+ * Applet Parameter we were started with. It is
|
|
+ * currently a fatal error if the VNC Server's cert
|
|
+ * doesn't match it.
|
|
+ */
|
|
+ new X509TrustManager() {
|
|
+ public java.security.cert.X509Certificate[]
|
|
+ getAcceptedIssuers() {
|
|
+ return null;
|
|
+ }
|
|
+ public void checkClientTrusted(
|
|
+ java.security.cert.X509Certificate[] certs,
|
|
+ String authType) throws CertificateException {
|
|
+ throw new CertificateException("No Clients (SRV)");
|
|
+ }
|
|
+ public void checkServerTrusted(
|
|
+ java.security.cert.X509Certificate[] certs,
|
|
+ String authType) throws CertificateException {
|
|
+ /* we want to check 'certs' against 'trustsrvCerts' */
|
|
+ if (trustsrvCerts == null) {
|
|
+ throw new CertificateException(
|
|
+ "No Trust srv Certs array.");
|
|
+ }
|
|
+ if (trustsrvCerts.length < 1) {
|
|
+ throw new CertificateException(
|
|
+ "No Trust srv Certs.");
|
|
+ }
|
|
+ if (certs == null) {
|
|
+ throw new CertificateException(
|
|
+ "No this-certs array.");
|
|
+ }
|
|
+ if (certs.length < 1) {
|
|
+ throw new CertificateException(
|
|
+ "No this-certs Certs.");
|
|
+ }
|
|
+ if (certs.length != trustsrvCerts.length) {
|
|
+ throw new CertificateException(
|
|
+ "certs.length != trustsrvCerts.length " + certs.length + " " + trustsrvCerts.length);
|
|
+ }
|
|
+ boolean ok = true;
|
|
+ for (int i = 0; i < certs.length; i++) {
|
|
+ if (! trustsrvCerts[i].equals(certs[i])) {
|
|
+ ok = false;
|
|
+ dbg("SRV: cert mismatch at i=" + i);
|
|
+ dbg("SRV: cert mismatch cert" + certs[i]);
|
|
+ dbg("SRV: cert mismatch srv" + trustsrvCerts[i]);
|
|
+ if (cert_fail == null) {
|
|
+ cert_fail = "server-cert-mismatch";
|
|
+ }
|
|
+ }
|
|
+ if (debug_certs) {
|
|
+ dbg("\n***********************************************");
|
|
+ dbg("SRV: cert info at i=" + i);
|
|
+ dbg("SRV: cert info cert" + certs[i]);
|
|
+ dbg("===============================================");
|
|
+ dbg("SRV: cert info srv" + trustsrvCerts[i]);
|
|
+ dbg("***********************************************");
|
|
+ }
|
|
+ }
|
|
+ if (!ok) {
|
|
+ throw new CertificateException(
|
|
+ "Server Cert Chain != serverCert Applet Parameter Cert Chain.");
|
|
+ }
|
|
+ dbg("SRV: trustsrvCerts[i] matches certs[i] i=0:" + (certs.length-1));
|
|
+ }
|
|
+ }
|
|
+ };
|
|
+
|
|
+ trustOneCert = new TrustManager[] {
|
|
+ /*
|
|
+ * this one accepts only the retrieved server
|
|
+ * cert by SSLSocket by this applet we stored in
|
|
+ * trustallCerts that user has accepted or applet
|
|
+ * parameter trustAllVncCerts=yes is set. This is
|
|
+ * for when we reconnect after the user has manually
|
|
+ * accepted the trustall cert in the dialog (or set
|
|
+ * trustAllVncCerts=yes applet param.)
|
|
+ */
|
|
+ new X509TrustManager() {
|
|
+ public java.security.cert.X509Certificate[]
|
|
+ getAcceptedIssuers() {
|
|
+ return null;
|
|
+ }
|
|
+ public void checkClientTrusted(
|
|
+ java.security.cert.X509Certificate[] certs,
|
|
+ String authType) throws CertificateException {
|
|
+ throw new CertificateException("No Clients (ONE)");
|
|
+ }
|
|
+ public void checkServerTrusted(
|
|
+ java.security.cert.X509Certificate[] certs,
|
|
+ String authType) throws CertificateException {
|
|
+ /* we want to check 'certs' against 'trustallCerts' */
|
|
+ if (trustallCerts == null) {
|
|
+ throw new CertificateException(
|
|
+ "No Trust All Server Certs array.");
|
|
+ }
|
|
+ if (trustallCerts.length < 1) {
|
|
+ throw new CertificateException(
|
|
+ "No Trust All Server Certs.");
|
|
+ }
|
|
+ if (certs == null) {
|
|
+ throw new CertificateException(
|
|
+ "No this-certs array.");
|
|
+ }
|
|
+ if (certs.length < 1) {
|
|
+ throw new CertificateException(
|
|
+ "No this-certs Certs.");
|
|
+ }
|
|
+ if (certs.length != trustallCerts.length) {
|
|
+ throw new CertificateException(
|
|
+ "certs.length != trustallCerts.length " + certs.length + " " + trustallCerts.length);
|
|
+ }
|
|
+ boolean ok = true;
|
|
+ for (int i = 0; i < certs.length; i++) {
|
|
+ if (! trustallCerts[i].equals(certs[i])) {
|
|
+ ok = false;
|
|
+ dbg("ONE: cert mismatch at i=" + i);
|
|
+ dbg("ONE: cert mismatch cert" + certs[i]);
|
|
+ dbg("ONE: cert mismatch all" + trustallCerts[i]);
|
|
+ }
|
|
+ if (debug_certs) {
|
|
+ dbg("\n***********************************************");
|
|
+ dbg("ONE: cert info at i=" + i);
|
|
+ dbg("ONE: cert info cert" + certs[i]);
|
|
+ dbg("===============================================");
|
|
+ dbg("ONE: cert info all" + trustallCerts[i]);
|
|
+ dbg("***********************************************");
|
|
+ }
|
|
+ }
|
|
+ if (!ok) {
|
|
+ throw new CertificateException(
|
|
+ "Server Cert Chain != TRUSTALL Cert Chain.");
|
|
+ }
|
|
+ dbg("ONE: trustallCerts[i] matches certs[i] i=0:" + (certs.length-1));
|
|
+ }
|
|
+ }
|
|
+ };
|
|
+
|
|
+ /*
|
|
+ * The above TrustManagers are used:
|
|
+ *
|
|
+ * 1) to retrieve the server cert in case of failure to
|
|
+ * display it to the user in a dialog.
|
|
+ * 2) to subsequently connect to the server if user agrees.
|
|
+ */
|
|
+
|
|
+ /*
|
|
+ * build oneTimeKey cert+key if supplied in applet parameter:
|
|
+ */
|
|
+ if (viewer.oneTimeKey != null && viewer.oneTimeKey.equals("PROMPT")) {
|
|
+ ClientCertDialog d = new ClientCertDialog();
|
|
+ viewer.oneTimeKey = d.queryUser();
|
|
+ }
|
|
+ if (viewer.oneTimeKey != null && viewer.oneTimeKey.indexOf(",") > 0) {
|
|
+ int idx = viewer.oneTimeKey.indexOf(",");
|
|
+
|
|
+ String onetimekey = viewer.oneTimeKey.substring(0, idx);
|
|
+ byte[] key = hex2bytes(onetimekey);
|
|
+ String onetimecert = viewer.oneTimeKey.substring(idx+1);
|
|
+ byte[] cert = hex2bytes(onetimecert);
|
|
+
|
|
+ KeyFactory kf = KeyFactory.getInstance("RSA");
|
|
+ PKCS8EncodedKeySpec keysp = new PKCS8EncodedKeySpec ( key );
|
|
+ PrivateKey ff = kf.generatePrivate (keysp);
|
|
+ if (debug_certs) {
|
|
+ dbg("one time key " + ff);
|
|
+ }
|
|
+
|
|
+ CertificateFactory cf = CertificateFactory.getInstance("X.509");
|
|
+ Collection c = cf.generateCertificates(new ByteArrayInputStream(cert));
|
|
+ Certificate[] certs = new Certificate[c.toArray().length];
|
|
+ if (c.size() == 1) {
|
|
+ Certificate tmpcert = cf.generateCertificate(new ByteArrayInputStream(cert));
|
|
+ if (debug_certs) {
|
|
+ dbg("one time cert" + tmpcert);
|
|
+ }
|
|
+ certs[0] = tmpcert;
|
|
+ } else {
|
|
+ certs = (Certificate[]) c.toArray();
|
|
+ }
|
|
+
|
|
+ KeyStore ks = KeyStore.getInstance("JKS");
|
|
+ ks.load(null, null);
|
|
+ ks.setKeyEntry("onetimekey", ff, "".toCharArray(), certs);
|
|
+ String da = KeyManagerFactory.getDefaultAlgorithm();
|
|
+ KeyManagerFactory kmf = KeyManagerFactory.getInstance(da);
|
|
+ kmf.init(ks, "".toCharArray());
|
|
+
|
|
+ mykey = kmf.getKeyManagers();
|
|
+ }
|
|
+
|
|
+ /*
|
|
+ * build serverCert cert if supplied in applet parameter:
|
|
+ */
|
|
+ if (viewer.serverCert != null) {
|
|
+ CertificateFactory cf = CertificateFactory.getInstance("X.509");
|
|
+ byte[] cert = hex2bytes(viewer.serverCert);
|
|
+ Collection c = cf.generateCertificates(new ByteArrayInputStream(cert));
|
|
+ trustsrvCerts = new Certificate[c.toArray().length];
|
|
+ if (c.size() == 1) {
|
|
+ Certificate tmpcert = cf.generateCertificate(new ByteArrayInputStream(cert));
|
|
+ trustsrvCerts[0] = tmpcert;
|
|
+ } else {
|
|
+ trustsrvCerts = (Certificate[]) c.toArray();
|
|
+ }
|
|
+ }
|
|
+
|
|
+ /* the trust loc certs context: */
|
|
+ try {
|
|
+ trustloc_ctx = SSLContext.getInstance("SSL");
|
|
+
|
|
+ /*
|
|
+ * below is a failed attempt to get jvm's default
|
|
+ * trust manager using null (below) makes it so
|
|
+ * for HttpsURLConnection the server cannot be
|
|
+ * verified (no prompting.)
|
|
+ */
|
|
+ if (false) {
|
|
+ boolean didit = false;
|
|
+ TrustManagerFactory tmf = TrustManagerFactory.getInstance(TrustManagerFactory.getDefaultAlgorithm());
|
|
+ tmf.init((KeyStore) null);
|
|
+ TrustManager [] tml = tmf.getTrustManagers();
|
|
+ for (int i = 0; i < tml.length; i++) {
|
|
+ TrustManager tm = tml[i];
|
|
+ if (tm instanceof X509TrustManager) {
|
|
+ TrustManager tm1[] = new TrustManager[1];
|
|
+ tm1[0] = tm;
|
|
+ trustloc_ctx.init(mykey, tm1, null);
|
|
+ didit = true;
|
|
+ break;
|
|
+ }
|
|
+ }
|
|
+ if (!didit) {
|
|
+ trustloc_ctx.init(mykey, null, null);
|
|
+ }
|
|
+ } else {
|
|
+ /* we have to set trust manager to null */
|
|
+ trustloc_ctx.init(mykey, null, null);
|
|
+ }
|
|
+
|
|
+ } catch (Exception e) {
|
|
+ String msg = "SSL trustloc_ctx FAILED.";
|
|
+ dbg(msg);
|
|
+ throw new Exception(msg);
|
|
+ }
|
|
+
|
|
+ /* the trust all certs context: */
|
|
+ try {
|
|
+ trustall_ctx = SSLContext.getInstance("SSL");
|
|
+ trustall_ctx.init(mykey, trustAllCerts, new
|
|
+ java.security.SecureRandom());
|
|
+
|
|
+ } catch (Exception e) {
|
|
+ String msg = "SSL trustall_ctx FAILED.";
|
|
+ dbg(msg);
|
|
+ throw new Exception(msg);
|
|
+ }
|
|
+
|
|
+ /* the trust url certs context: */
|
|
+ try {
|
|
+ trusturl_ctx = SSLContext.getInstance("SSL");
|
|
+ trusturl_ctx.init(mykey, trustUrlCert, new
|
|
+ java.security.SecureRandom());
|
|
+
|
|
+ } catch (Exception e) {
|
|
+ String msg = "SSL trusturl_ctx FAILED.";
|
|
+ dbg(msg);
|
|
+ throw new Exception(msg);
|
|
+ }
|
|
+
|
|
+ /* the trust srv certs context: */
|
|
+ try {
|
|
+ trustsrv_ctx = SSLContext.getInstance("SSL");
|
|
+ trustsrv_ctx.init(mykey, trustSrvCert, new
|
|
+ java.security.SecureRandom());
|
|
+
|
|
+ } catch (Exception e) {
|
|
+ String msg = "SSL trustsrv_ctx FAILED.";
|
|
+ dbg(msg);
|
|
+ throw new Exception(msg);
|
|
+ }
|
|
+
|
|
+ /* the trust the one cert from server context: */
|
|
+ try {
|
|
+ trustone_ctx = SSLContext.getInstance("SSL");
|
|
+ trustone_ctx.init(mykey, trustOneCert, new
|
|
+ java.security.SecureRandom());
|
|
+
|
|
+ } catch (Exception e) {
|
|
+ String msg = "SSL trustone_ctx FAILED.";
|
|
+ dbg(msg);
|
|
+ throw new Exception(msg);
|
|
+ }
|
|
+ }
|
|
+
|
|
+ /*
|
|
+ * we call this early on to 1) check for a proxy, 2) grab
|
|
+ * Browser/JVM accepted HTTPS cert.
|
|
+ */
|
|
+ public void check_for_proxy_and_grab_vnc_server_cert() {
|
|
+
|
|
+ trusturlCerts = null;
|
|
+ proxy_in_use = false;
|
|
+
|
|
+ if (viewer.ignoreProxy) {
|
|
+ /* applet param says skip it. */
|
|
+ /* the downside is we do not set trusturlCerts for comparison later... */
|
|
+ /* nor do we autodetect x11vnc for GET=1. */
|
|
+ return;
|
|
+ }
|
|
+
|
|
+ dbg("------------------------------------------------");
|
|
+ dbg("Into check_for_proxy_and_grab_vnc_server_cert():");
|
|
+
|
|
+ dbg("TRYING HTTPS:");
|
|
+ String ustr = "https://" + host + ":";
|
|
+ if (viewer.httpsPort != null) {
|
|
+ ustr += viewer.httpsPort;
|
|
+ } else {
|
|
+ ustr += port;
|
|
+ }
|
|
+ ustr += viewer.urlPrefix + "/check.https.proxy.connection";
|
|
+ dbg("ustr is: " + ustr);
|
|
+
|
|
+ try {
|
|
+ /* prepare for an HTTPS URL connection to host:port */
|
|
+ URL url = new URL(ustr);
|
|
+ HttpsURLConnection https = (HttpsURLConnection) url.openConnection();
|
|
+
|
|
+ if (mykey != null) {
|
|
+ /* with oneTimeKey (mykey) we can't use the default SSL context */
|
|
+ if (trustsrvCerts != null) {
|
|
+ dbg("passing trustsrv_ctx to HttpsURLConnection to provide client cert.");
|
|
+ https.setSSLSocketFactory(trustsrv_ctx.getSocketFactory());
|
|
+ } else if (trustloc_ctx != null) {
|
|
+ dbg("passing trustloc_ctx to HttpsURLConnection to provide client cert.");
|
|
+ https.setSSLSocketFactory(trustloc_ctx.getSocketFactory());
|
|
+ }
|
|
+ }
|
|
+
|
|
+ https.setUseCaches(false);
|
|
+ https.setRequestMethod("GET");
|
|
+ https.setRequestProperty("Pragma", "No-Cache");
|
|
+ https.setRequestProperty("Proxy-Connection", "Keep-Alive");
|
|
+ https.setDoInput(true);
|
|
+
|
|
+ dbg("trying https.connect()");
|
|
+ https.connect();
|
|
+
|
|
+ dbg("trying https.getServerCertificates()");
|
|
+ trusturlCerts = https.getServerCertificates();
|
|
+
|
|
+ if (trusturlCerts == null) {
|
|
+ dbg("set trusturlCerts to null!");
|
|
+ } else {
|
|
+ dbg("set trusturlCerts to non-null");
|
|
+ }
|
|
+
|
|
+ if (https.usingProxy()) {
|
|
+ proxy_in_use = true;
|
|
+ dbg("An HTTPS proxy is in use. There may be connection problems.");
|
|
+ }
|
|
+
|
|
+ dbg("trying https.getContent()");
|
|
+ Object output = https.getContent();
|
|
+ dbg("trying https.disconnect()");
|
|
+ https.disconnect();
|
|
+ if (! viewer.GET) {
|
|
+ String header = https.getHeaderField("VNC-Server");
|
|
+ if (header != null && header.startsWith("x11vnc")) {
|
|
+ dbg("detected x11vnc server (1), setting GET=1");
|
|
+ viewer.GET = true;
|
|
+ }
|
|
+ }
|
|
+
|
|
+ } catch(Exception e) {
|
|
+ dbg("HttpsURLConnection: " + e.getMessage());
|
|
+ }
|
|
+
|
|
+ if (proxy_in_use) {
|
|
+ dbg("exit check_for_proxy_and_grab_vnc_server_cert():");
|
|
+ dbg("------------------------------------------------");
|
|
+ return;
|
|
+ } else if (trusturlCerts != null && !viewer.forceProxy) {
|
|
+ /* Allow user to require HTTP check? use forceProxy for now. */
|
|
+ dbg("SKIPPING HTTP PROXY CHECK: got trusturlCerts, assuming proxy info is correct.");
|
|
+ dbg("exit check_for_proxy_and_grab_vnc_server_cert():");
|
|
+ dbg("------------------------------------------------");
|
|
+ return;
|
|
+ }
|
|
+
|
|
+ /*
|
|
+ * XXX need to remember scenario where this extra check
|
|
+ * gives useful info. User's Browser proxy settings?
|
|
+ */
|
|
+ dbg("TRYING HTTP:");
|
|
+ ustr = "http://" + host + ":" + port;
|
|
+ ustr += viewer.urlPrefix + "/index.vnc";
|
|
+ dbg("ustr is: " + ustr);
|
|
+
|
|
+ try {
|
|
+ /* prepare for an HTTP URL connection to the same host:port (but not httpsPort) */
|
|
+ URL url = new URL(ustr);
|
|
+ HttpURLConnection http = (HttpURLConnection)
|
|
+ url.openConnection();
|
|
+
|
|
+ http.setUseCaches(false);
|
|
+ http.setRequestMethod("GET");
|
|
+ http.setRequestProperty("Pragma", "No-Cache");
|
|
+ http.setRequestProperty("Proxy-Connection", "Keep-Alive");
|
|
+ http.setDoInput(true);
|
|
+
|
|
+ dbg("trying http.connect()");
|
|
+ http.connect();
|
|
+
|
|
+ if (http.usingProxy()) {
|
|
+ proxy_in_use = true;
|
|
+ dbg("An HTTP proxy is in use. There may be connection problems.");
|
|
+ }
|
|
+ dbg("trying http.getContent()");
|
|
+ Object output = http.getContent();
|
|
+ dbg("trying http.disconnect()");
|
|
+ http.disconnect();
|
|
+ if (! viewer.GET) {
|
|
+ String header = http.getHeaderField("VNC-Server");
|
|
+ if (header != null && header.startsWith("x11vnc")) {
|
|
+ dbg("detected x11vnc server (2), setting GET=1");
|
|
+ viewer.GET = true;
|
|
+ }
|
|
+ }
|
|
+ } catch(Exception e) {
|
|
+ dbg("HttpURLConnection: " + e.getMessage());
|
|
+ }
|
|
+ dbg("exit check_for_proxy_and_grab_vnc_server_cert():");
|
|
+ dbg("------------------------------------------------");
|
|
+ }
|
|
+
|
|
+ public Socket connectSock() throws IOException {
|
|
+ /*
|
|
+ * first try a https connection to detect a proxy, and
|
|
+ * grab the VNC server cert at the same time:
|
|
+ */
|
|
+ check_for_proxy_and_grab_vnc_server_cert();
|
|
+
|
|
+ boolean srv_cert = false;
|
|
+
|
|
+ if (trustsrvCerts != null) {
|
|
+ /* applet parameter suppled serverCert */
|
|
+ dbg("viewer.trustSrvCert-0 using trustsrv_ctx");
|
|
+ factory = trustsrv_ctx.getSocketFactory();
|
|
+ srv_cert = true;
|
|
+ } else if (viewer.trustAllVncCerts) {
|
|
+ /* trust all certs (no checking) */
|
|
+ dbg("viewer.trustAllVncCerts-0 using trustall_ctx");
|
|
+ factory = trustall_ctx.getSocketFactory();
|
|
+ } else if (trusturlCerts != null) {
|
|
+ /* trust certs the Browser/JVM accepted in check_for_proxy... */
|
|
+ dbg("using trusturl_ctx");
|
|
+ factory = trusturl_ctx.getSocketFactory();
|
|
+ } else {
|
|
+ /* trust the local defaults */
|
|
+ dbg("using trustloc_ctx");
|
|
+ factory = trustloc_ctx.getSocketFactory();
|
|
+ }
|
|
+
|
|
+ socket = null;
|
|
+
|
|
+ try {
|
|
+ if (proxy_in_use && viewer.forceProxy) {
|
|
+ throw new Exception("forcing proxy (forceProxy)");
|
|
+ } else if (viewer.CONNECT != null) {
|
|
+ throw new Exception("forcing CONNECT");
|
|
+ }
|
|
+
|
|
+ int timeout = 6;
|
|
+ if (timeout > 0) {
|
|
+ socket = (SSLSocket) factory.createSocket();
|
|
+ InetSocketAddress inetaddr = new InetSocketAddress(host, port);
|
|
+ dbg("Using timeout of " + timeout + " secs to: " + host + ":" + port);
|
|
+ socket.connect(inetaddr, timeout * 1000);
|
|
+ } else {
|
|
+ socket = (SSLSocket) factory.createSocket(host, port);
|
|
+ }
|
|
+
|
|
+ } catch (Exception esock) {
|
|
+ dbg("socket error: " + esock.getMessage());
|
|
+ if (proxy_in_use || viewer.CONNECT != null) {
|
|
+ proxy_failure = true;
|
|
+ if (proxy_in_use) {
|
|
+ dbg("HTTPS proxy in use. Trying to go with it.");
|
|
+ } else {
|
|
+ dbg("viewer.CONNECT reverse proxy in use. Trying to go with it.");
|
|
+ }
|
|
+ try {
|
|
+ socket = proxy_socket(factory);
|
|
+ } catch (Exception e) {
|
|
+ dbg("proxy_socket error: " + e.getMessage());
|
|
+ }
|
|
+ } else {
|
|
+ /* n.b. socket is left in error state to cause ex. below. */
|
|
+ }
|
|
+ }
|
|
+
|
|
+ try {
|
|
+ socket.startHandshake();
|
|
+
|
|
+ dbg("The Server Connection Verified OK on 1st try.");
|
|
+
|
|
+ java.security.cert.Certificate[] currentTrustedCerts;
|
|
+ BrowserCertsDialog bcd;
|
|
+
|
|
+ SSLSession sess = socket.getSession();
|
|
+ currentTrustedCerts = sess.getPeerCertificates();
|
|
+
|
|
+ if (viewer.trustAllVncCerts) {
|
|
+ dbg("viewer.trustAllVncCerts-1 keeping socket.");
|
|
+ } else if (currentTrustedCerts == null || currentTrustedCerts.length < 1) {
|
|
+ try {
|
|
+ socket.close();
|
|
+ } catch (Exception e) {
|
|
+ dbg("socket is grumpy.");
|
|
+ }
|
|
+ socket = null;
|
|
+ throw new SSLHandshakeException("no current certs");
|
|
+ }
|
|
+
|
|
+ String serv = "";
|
|
+ try {
|
|
+ CertInfo ci = new CertInfo(currentTrustedCerts[0]);
|
|
+ serv = ci.get_certinfo("CN");
|
|
+ } catch (Exception e) {
|
|
+ ;
|
|
+ }
|
|
+
|
|
+ if (viewer.trustAllVncCerts) {
|
|
+ dbg("viewer.trustAllVncCerts-2 skipping browser certs dialog");
|
|
+ user_wants_to_see_cert = false;
|
|
+ } else if (viewer.serverCert != null && trustsrvCerts != null) {
|
|
+ dbg("viewer.serverCert-1 skipping browser certs dialog");
|
|
+ user_wants_to_see_cert = false;
|
|
+ } else if (viewer.trustUrlVncCert) {
|
|
+ dbg("viewer.trustUrlVncCert-1 skipping browser certs dialog");
|
|
+ user_wants_to_see_cert = false;
|
|
+ } else {
|
|
+ /* have a dialog with the user: */
|
|
+ bcd = new BrowserCertsDialog(serv, host + ":" + port);
|
|
+ dbg("browser certs dialog begin.");
|
|
+ bcd.queryUser();
|
|
+ dbg("browser certs dialog finished.");
|
|
+
|
|
+ if (bcd.showCertDialog) {
|
|
+ String msg = "user wants to see cert";
|
|
+ dbg(msg);
|
|
+ user_wants_to_see_cert = true;
|
|
+ if (cert_fail == null) {
|
|
+ cert_fail = "user-view";
|
|
+ }
|
|
+ throw new SSLHandshakeException(msg);
|
|
+ } else {
|
|
+ user_wants_to_see_cert = false;
|
|
+ dbg("browser certs dialog: user said yes, accept it");
|
|
+ }
|
|
+ }
|
|
+
|
|
+ } catch (SSLHandshakeException eh) {
|
|
+ dbg("SSLHandshakeException: could not automatically verify Server.");
|
|
+ dbg("msg: " + eh.getMessage());
|
|
+
|
|
+
|
|
+ /* send a cleanup string just in case: */
|
|
+ String getoutstr = "GET /index.vnc HTTP/1.0\r\nConnection: close\r\n\r\n";
|
|
+
|
|
+ try {
|
|
+ OutputStream os = socket.getOutputStream();
|
|
+ os.write(getoutstr.getBytes());
|
|
+ socket.close();
|
|
+ } catch (Exception e) {
|
|
+ dbg("socket is grumpy!");
|
|
+ }
|
|
+
|
|
+ /* reload */
|
|
+
|
|
+ socket = null;
|
|
+
|
|
+ String reason = null;
|
|
+
|
|
+ if (srv_cert) {
|
|
+ /* for serverCert usage we make this a fatal error. */
|
|
+ throw new IOException("Fatal: VNC Server's Cert does not match Applet Parameter 'serverCert=...'");
|
|
+ /* see below in TrustDialog were we describe this case to user anyway */
|
|
+ }
|
|
+
|
|
+ /*
|
|
+ * Reconnect, trusting any cert, so we can grab
|
|
+ * the cert to show it to the user in a dialog
|
|
+ * for him to manually accept. This connection
|
|
+ * is not used for anything else.
|
|
+ */
|
|
+ factory = trustall_ctx.getSocketFactory();
|
|
+ if (proxy_failure) {
|
|
+ socket = proxy_socket(factory);
|
|
+ } else {
|
|
+ socket = (SSLSocket) factory.createSocket(host, port);
|
|
+ }
|
|
+
|
|
+ if (debug_certs) {
|
|
+ dbg("trusturlCerts: " + trusturlCerts);
|
|
+ dbg("trustsrvCerts: " + trustsrvCerts);
|
|
+ }
|
|
+ if (trusturlCerts == null && cert_fail == null) {
|
|
+ cert_fail = "missing-certs";
|
|
+ }
|
|
+
|
|
+ try {
|
|
+ socket.startHandshake();
|
|
+
|
|
+ dbg("The TrustAll Server Cert-grab Connection (trivially) Verified OK.");
|
|
+
|
|
+ /* grab the cert: */
|
|
+ try {
|
|
+ SSLSession sess = socket.getSession();
|
|
+ trustallCerts = sess.getPeerCertificates();
|
|
+ } catch (Exception e) {
|
|
+ throw new Exception("Could not get " +
|
|
+ "Peer Certificate");
|
|
+ }
|
|
+ if (debug_certs) {
|
|
+ dbg("trustallCerts: " + trustallCerts);
|
|
+ }
|
|
+
|
|
+ if (viewer.trustAllVncCerts) {
|
|
+ dbg("viewer.trustAllVncCerts-3. skipping dialog, trusting everything.");
|
|
+ } else if (! browser_cert_match()) {
|
|
+ /*
|
|
+ * close socket now, we will reopen after
|
|
+ * dialog if user agrees to use the cert.
|
|
+ */
|
|
+ try {
|
|
+ OutputStream os = socket.getOutputStream();
|
|
+ os.write(getoutstr.getBytes());
|
|
+ socket.close();
|
|
+ } catch (Exception e) {
|
|
+ dbg("socket is grumpy!!");
|
|
+ }
|
|
+ socket = null;
|
|
+
|
|
+ /* dialog with user to accept cert or not: */
|
|
+
|
|
+ TrustDialog td= new TrustDialog(host, port,
|
|
+ trustallCerts);
|
|
+
|
|
+ if (cert_fail == null) {
|
|
+ ;
|
|
+ } else if (cert_fail.equals("user-view")) {
|
|
+ reason = "Reason for this Dialog:\n\n"
|
|
+ + " You Asked to View the Certificate.";
|
|
+ } else if (cert_fail.equals("server-cert-mismatch")) {
|
|
+ /* this is now fatal error, see above. */
|
|
+ reason = "Reason for this Dialog:\n\n"
|
|
+ + " The VNC Server's Certificate does not match the Certificate\n"
|
|
+ + " specified in the supplied 'serverCert' Applet Parameter.";
|
|
+ } else if (cert_fail.equals("cert-mismatch")) {
|
|
+ reason = "Reason for this Dialog:\n\n"
|
|
+ + " The VNC Server's Certificate does not match the Website's\n"
|
|
+ + " HTTPS Certificate (that you previously accepted; either\n"
|
|
+ + " manually or automatically via Certificate Authority.)";
|
|
+ } else if (cert_fail.equals("missing-certs")) {
|
|
+ reason = "Reason for this Dialog:\n\n"
|
|
+ + " Not all Certificates could be obtained to check.";
|
|
+ }
|
|
+
|
|
+ if (! td.queryUser(reason)) {
|
|
+ String msg = "User decided against it.";
|
|
+ dbg(msg);
|
|
+ throw new IOException(msg);
|
|
+ }
|
|
+ }
|
|
+
|
|
+ } catch (Exception ehand2) {
|
|
+ dbg("** Could not TrustAll Verify Server!");
|
|
+
|
|
+ throw new IOException(ehand2.getMessage());
|
|
+ }
|
|
+
|
|
+ /* reload again: */
|
|
+
|
|
+ if (socket != null) {
|
|
+ try {
|
|
+ socket.close();
|
|
+ } catch (Exception e) {
|
|
+ dbg("socket is grumpy!!!");
|
|
+ }
|
|
+ socket = null;
|
|
+ }
|
|
+
|
|
+ /*
|
|
+ * Now connect a 3rd time, using the cert
|
|
+ * retrieved during connection 2 (sadly, that
|
|
+ * the user likely blindly agreed to...)
|
|
+ */
|
|
+
|
|
+ factory = trustone_ctx.getSocketFactory();
|
|
+ if (proxy_failure) {
|
|
+ socket = proxy_socket(factory);
|
|
+ } else {
|
|
+ socket = (SSLSocket) factory.createSocket(host, port);
|
|
+ }
|
|
+
|
|
+ try {
|
|
+ socket.startHandshake();
|
|
+ dbg("TrustAll/TrustOne Server Connection Verified #3.");
|
|
+
|
|
+ } catch (Exception ehand3) {
|
|
+ dbg("** Could not TrustAll/TrustOne Verify Server #3.");
|
|
+
|
|
+ throw new IOException(ehand3.getMessage());
|
|
+ }
|
|
+ }
|
|
+
|
|
+ /* we have socket (possibly null) at this point, so proceed: */
|
|
+
|
|
+ /* handle x11vnc GET=1, if applicable: */
|
|
+ if (socket != null && viewer.GET) {
|
|
+ String str = "GET ";
|
|
+ str += viewer.urlPrefix;
|
|
+ str += "/request.https.vnc.connection";
|
|
+ str += " HTTP/1.0\r\n";
|
|
+ str += "Pragma: No-Cache\r\n";
|
|
+ str += "\r\n";
|
|
+
|
|
+ System.out.println("sending: " + str);
|
|
+ OutputStream os = socket.getOutputStream();
|
|
+ String type = "os";
|
|
+
|
|
+ if (type == "os") {
|
|
+ os.write(str.getBytes());
|
|
+ os.flush();
|
|
+ System.out.println("used OutputStream");
|
|
+ } else if (type == "bs") {
|
|
+ BufferedOutputStream bs = new BufferedOutputStream(os);
|
|
+ bs.write(str.getBytes());
|
|
+ bs.flush();
|
|
+ System.out.println("used BufferedOutputStream");
|
|
+ } else if (type == "ds") {
|
|
+ DataOutputStream ds = new DataOutputStream(os);
|
|
+ ds.write(str.getBytes());
|
|
+ ds.flush();
|
|
+ System.out.println("used DataOutputStream");
|
|
+ }
|
|
+ if (false) {
|
|
+ String rep = "";
|
|
+ DataInputStream is = new DataInputStream(
|
|
+ new BufferedInputStream(socket.getInputStream(), 16384));
|
|
+ while (true) {
|
|
+ rep += readline(is);
|
|
+ if (rep.indexOf("\r\n\r\n") >= 0) {
|
|
+ break;
|
|
+ }
|
|
+ }
|
|
+ System.out.println("rep: " + rep);
|
|
+ }
|
|
+ }
|
|
+
|
|
+ dbg("SSL returning socket to caller.");
|
|
+ dbg("");
|
|
+
|
|
+ /* could be null, let caller handle that. */
|
|
+ return (Socket) socket;
|
|
+ }
|
|
+
|
|
+ boolean browser_cert_match() {
|
|
+ String msg = "Browser URL accept previously accepted cert";
|
|
+
|
|
+ if (user_wants_to_see_cert) {
|
|
+ return false;
|
|
+ }
|
|
+
|
|
+ if (viewer.serverCert != null || trustsrvCerts != null) {
|
|
+ if (cert_fail == null) {
|
|
+ cert_fail = "server-cert-mismatch";
|
|
+ }
|
|
+ }
|
|
+ if (trustallCerts != null && trusturlCerts != null) {
|
|
+ if (trustallCerts.length == trusturlCerts.length) {
|
|
+ boolean ok = true;
|
|
+ /* check toath trustallCerts (socket) equals trusturlCerts (browser) */
|
|
+ for (int i = 0; i < trusturlCerts.length; i++) {
|
|
+ if (! trustallCerts[i].equals(trusturlCerts[i])) {
|
|
+ dbg("BCM: cert mismatch at i=" + i);
|
|
+ dbg("BCM: cert mismatch url" + trusturlCerts[i]);
|
|
+ dbg("BCM: cert mismatch all" + trustallCerts[i]);
|
|
+ ok = false;
|
|
+ }
|
|
+ }
|
|
+ if (ok) {
|
|
+ System.out.println(msg);
|
|
+ if (cert_fail == null) {
|
|
+ cert_fail = "did-not-fail";
|
|
+ }
|
|
+ return true;
|
|
+ } else {
|
|
+ if (cert_fail == null) {
|
|
+ cert_fail = "cert-mismatch";
|
|
+ }
|
|
+ return false;
|
|
+ }
|
|
+ }
|
|
+ }
|
|
+ if (cert_fail == null) {
|
|
+ cert_fail = "missing-certs";
|
|
+ }
|
|
+ return false;
|
|
+ }
|
|
+
|
|
+ private void dbg(String s) {
|
|
+ if (debug) {
|
|
+ System.out.println(s);
|
|
+ }
|
|
+ }
|
|
+
|
|
+ private int gint(String s) {
|
|
+ int n = -1;
|
|
+ try {
|
|
+ Integer I = new Integer(s);
|
|
+ n = I.intValue();
|
|
+ } catch (Exception ex) {
|
|
+ return -1;
|
|
+ }
|
|
+ return n;
|
|
+ }
|
|
+
|
|
+ /* this will do the proxy CONNECT negotiation and hook us up. */
|
|
+
|
|
+ private void proxy_helper(String proxyHost, int proxyPort) {
|
|
+
|
|
+ boolean proxy_auth = false;
|
|
+ String proxy_auth_basic_realm = "";
|
|
+ String hp = host + ":" + port;
|
|
+ dbg("proxy_helper: " + proxyHost + ":" + proxyPort + " hp: " + hp);
|
|
+
|
|
+ /* we loop here a few times trying for the password case */
|
|
+ for (int k=0; k < 2; k++) {
|
|
+ dbg("proxy_in_use psocket: " + k);
|
|
+
|
|
+ if (proxySock != null) {
|
|
+ try {
|
|
+ proxySock.close();
|
|
+ } catch (Exception e) {
|
|
+ dbg("proxy socket is grumpy.");
|
|
+ }
|
|
+ }
|
|
+
|
|
+ proxySock = psocket(proxyHost, proxyPort);
|
|
+ if (proxySock == null) {
|
|
+ dbg("1-a sadly, returning a null socket");
|
|
+ return;
|
|
+ }
|
|
+
|
|
+ String req1 = "CONNECT " + hp + " HTTP/1.1\r\n"
|
|
+ + "Host: " + hp + "\r\n";
|
|
+
|
|
+ dbg("requesting via proxy: " + req1);
|
|
+
|
|
+ if (proxy_auth) {
|
|
+ if (proxy_auth_string == null) {
|
|
+ ProxyPasswdDialog pp = new ProxyPasswdDialog(proxyHost, proxyPort, proxy_auth_basic_realm);
|
|
+ pp.queryUser();
|
|
+ proxy_auth_string = pp.getAuth();
|
|
+ }
|
|
+ //dbg("auth1: " + proxy_auth_string);
|
|
+
|
|
+ String auth2 = Base64Coder.encodeString(proxy_auth_string);
|
|
+ //dbg("auth2: " + auth2);
|
|
+
|
|
+ req1 += "Proxy-Authorization: Basic " + auth2 + "\r\n";
|
|
+ //dbg("req1: " + req1);
|
|
+
|
|
+ dbg("added Proxy-Authorization: Basic ... to request");
|
|
+ }
|
|
+ req1 += "\r\n";
|
|
+
|
|
+ try {
|
|
+ proxy_os.write(req1.getBytes());
|
|
+ String reply = readline(proxy_is);
|
|
+
|
|
+ dbg("proxy replied: " + reply.trim());
|
|
+
|
|
+ if (reply.indexOf("HTTP/1.") == 0 && reply.indexOf(" 407 ") > 0) {
|
|
+ proxy_auth = true;
|
|
+ proxySock.close();
|
|
+ } else if (reply.indexOf("HTTP/1.") < 0 && reply.indexOf(" 200") < 0) {
|
|
+ proxySock.close();
|
|
+ proxySock = psocket(proxyHost, proxyPort);
|
|
+ if (proxySock == null) {
|
|
+ dbg("2-a sadly, returning a null socket");
|
|
+ return;
|
|
+ }
|
|
+ }
|
|
+ } catch(Exception e) {
|
|
+ dbg("some proxy socket problem: " + e.getMessage());
|
|
+ }
|
|
+
|
|
+ /* read the rest of the HTTP headers */
|
|
+ while (true) {
|
|
+ String line = readline(proxy_is);
|
|
+ dbg("proxy line: " + line.trim());
|
|
+ if (proxy_auth) {
|
|
+ String uc = line.toLowerCase();
|
|
+ if (uc.indexOf("proxy-authenticate:") == 0) {
|
|
+ if (uc.indexOf(" basic ") >= 0) {
|
|
+ int idx = uc.indexOf(" realm");
|
|
+ if (idx >= 0) {
|
|
+ proxy_auth_basic_realm = uc.substring(idx+1);
|
|
+ }
|
|
+ }
|
|
+ }
|
|
+ }
|
|
+ if (line.equals("\r\n") || line.equals("\n")) {
|
|
+ break;
|
|
+ }
|
|
+ }
|
|
+ if (!proxy_auth || proxy_auth_basic_realm.equals("")) {
|
|
+ /* we only try once for the non-password case: */
|
|
+ break;
|
|
+ }
|
|
+ }
|
|
+ }
|
|
+
|
|
+ public SSLSocket proxy_socket(SSLSocketFactory factory) {
|
|
+ Properties props = null;
|
|
+ String proxyHost = null;
|
|
+ int proxyPort = 0;
|
|
+ String proxyHost_nossl = null;
|
|
+ int proxyPort_nossl = 0;
|
|
+ String str;
|
|
+
|
|
+ /* see if we can guess the proxy info from Properties: */
|
|
+ try {
|
|
+ props = System.getProperties();
|
|
+ } catch (Exception e) {
|
|
+ /* sandboxed applet might not be able to read it. */
|
|
+ dbg("props failed: " + e.getMessage());
|
|
+ }
|
|
+ if (viewer.proxyHost != null) {
|
|
+ dbg("Using supplied proxy " + viewer.proxyHost + " " + viewer.proxyPort + " applet parameters.");
|
|
+ proxyHost = viewer.proxyHost;
|
|
+ if (viewer.proxyPort != null) {
|
|
+ proxyPort = gint(viewer.proxyPort);
|
|
+ } else {
|
|
+ proxyPort = 8080;
|
|
+ }
|
|
+
|
|
+ } else if (props != null) {
|
|
+ dbg("\n---------------\nAll props:");
|
|
+ props.list(System.out);
|
|
+ dbg("\n---------------\n\n");
|
|
+
|
|
+ /* scrape throught properties looking for proxy info: */
|
|
+
|
|
+ for (Enumeration e = props.propertyNames(); e.hasMoreElements(); ) {
|
|
+ String s = (String) e.nextElement();
|
|
+ String v = System.getProperty(s);
|
|
+ String s2 = s.toLowerCase();
|
|
+ String v2 = v.toLowerCase();
|
|
+
|
|
+ if (s2.indexOf("proxy.https.host") >= 0) {
|
|
+ proxyHost = v2;
|
|
+ continue;
|
|
+ }
|
|
+ if (s2.indexOf("proxy.https.port") >= 0) {
|
|
+ proxyPort = gint(v2);
|
|
+ continue;
|
|
+ }
|
|
+ if (s2.indexOf("proxy.http.host") >= 0) {
|
|
+ proxyHost_nossl = v2;
|
|
+ continue;
|
|
+ }
|
|
+ if (s2.indexOf("proxy.http.port") >= 0) {
|
|
+ proxyPort_nossl = gint(v2);
|
|
+ continue;
|
|
+ }
|
|
+ }
|
|
+
|
|
+ for (Enumeration e = props.propertyNames(); e.hasMoreElements(); ) {
|
|
+ String s = (String) e.nextElement();
|
|
+ String v = System.getProperty(s);
|
|
+ String s2 = s.toLowerCase();
|
|
+ String v2 = v.toLowerCase();
|
|
+
|
|
+ if (proxyHost != null && proxyPort > 0) {
|
|
+ break;
|
|
+ }
|
|
+
|
|
+ // look for something like: javaplugin.proxy.config.list = http=10.0.2.1:8082
|
|
+ if (s2.indexOf("proxy") < 0 && v2.indexOf("proxy") < 0) {
|
|
+ continue;
|
|
+ }
|
|
+ if (v2.indexOf("http") < 0) {
|
|
+ continue;
|
|
+ }
|
|
+
|
|
+ String[] pieces = v.split("[,;]");
|
|
+ for (int i = 0; i < pieces.length; i++) {
|
|
+ String p = pieces[i];
|
|
+ int j = p.indexOf("https");
|
|
+ if (j < 0) {
|
|
+ j = p.indexOf("http");
|
|
+ if (j < 0) {
|
|
+ continue;
|
|
+ }
|
|
+ }
|
|
+ j = p.indexOf("=", j);
|
|
+ if (j < 0) {
|
|
+ continue;
|
|
+ }
|
|
+ p = p.substring(j+1);
|
|
+ String [] hp = p.split(":");
|
|
+ if (hp.length != 2) {
|
|
+ continue;
|
|
+ }
|
|
+ if (hp[0].length() > 1 && hp[1].length() > 1) {
|
|
+
|
|
+ proxyPort = gint(hp[1]);
|
|
+ if (proxyPort < 0) {
|
|
+ continue;
|
|
+ }
|
|
+ proxyHost = new String(hp[0]);
|
|
+ break;
|
|
+ }
|
|
+ }
|
|
+ }
|
|
+ }
|
|
+ if (proxyHost != null) {
|
|
+ if (proxyHost_nossl != null && proxyPort_nossl > 0) {
|
|
+ dbg("Using http proxy info instead of https.");
|
|
+ proxyHost = proxyHost_nossl;
|
|
+ proxyPort = proxyPort_nossl;
|
|
+ }
|
|
+ }
|
|
+
|
|
+ if (proxy_in_use) {
|
|
+ if (proxy_dialog_host != null && proxy_dialog_port > 0) {
|
|
+ proxyHost = proxy_dialog_host;
|
|
+ proxyPort = proxy_dialog_port;
|
|
+ }
|
|
+ if (proxyHost != null) {
|
|
+ dbg("Lucky us! we figured out the Proxy parameters: " + proxyHost + " " + proxyPort);
|
|
+ } else {
|
|
+ /* ask user to help us: */
|
|
+ ProxyDialog pd = new ProxyDialog(proxyHost, proxyPort);
|
|
+ pd.queryUser();
|
|
+ proxyHost = pd.getHost();
|
|
+ proxyPort = pd.getPort();
|
|
+ proxy_dialog_host = new String(proxyHost);
|
|
+ proxy_dialog_port = proxyPort;
|
|
+ dbg("User said host: " + pd.getHost() + " port: " + pd.getPort());
|
|
+ }
|
|
+
|
|
+ proxy_helper(proxyHost, proxyPort);
|
|
+ if (proxySock == null) {
|
|
+ return null;
|
|
+ }
|
|
+ } else if (viewer.CONNECT != null) {
|
|
+ dbg("viewer.CONNECT psocket:");
|
|
+ proxySock = psocket(host, port);
|
|
+ if (proxySock == null) {
|
|
+ dbg("1-b sadly, returning a null socket");
|
|
+ return null;
|
|
+ }
|
|
+ }
|
|
+
|
|
+ if (viewer.CONNECT != null) {
|
|
+ String hp = viewer.CONNECT;
|
|
+ String req2 = "CONNECT " + hp + " HTTP/1.1\r\n"
|
|
+ + "Host: " + hp + "\r\n\r\n";
|
|
+
|
|
+ dbg("requesting2: " + req2);
|
|
+
|
|
+ try {
|
|
+ proxy_os.write(req2.getBytes());
|
|
+ String reply = readline(proxy_is);
|
|
+
|
|
+ dbg("proxy replied2: " + reply.trim());
|
|
+
|
|
+ if (reply.indexOf("HTTP/1.") < 0 && reply.indexOf(" 200") < 0) {
|
|
+ proxySock.close();
|
|
+ proxySock = psocket(proxyHost, proxyPort);
|
|
+ if (proxySock == null) {
|
|
+ dbg("2-b sadly, returning a null socket");
|
|
+ return null;
|
|
+ }
|
|
+ }
|
|
+ } catch(Exception e) {
|
|
+ dbg("proxy socket problem-2: " + e.getMessage());
|
|
+ }
|
|
+
|
|
+ while (true) {
|
|
+ String line = readline(proxy_is);
|
|
+ dbg("proxy line2: " + line.trim());
|
|
+ if (line.equals("\r\n") || line.equals("\n")) {
|
|
+ break;
|
|
+ }
|
|
+ }
|
|
+ }
|
|
+
|
|
+ Socket sslsock = null;
|
|
+ try {
|
|
+ sslsock = factory.createSocket(proxySock, host, port, true);
|
|
+ } catch(Exception e) {
|
|
+ dbg("sslsock prob: " + e.getMessage());
|
|
+ dbg("3 sadly, returning a null socket");
|
|
+ }
|
|
+
|
|
+ return (SSLSocket) sslsock;
|
|
+ }
|
|
+
|
|
+ Socket psocket(String h, int p) {
|
|
+ Socket psock = null;
|
|
+ try {
|
|
+ psock = new Socket(h, p);
|
|
+ proxy_is = new DataInputStream(new BufferedInputStream(
|
|
+ psock.getInputStream(), 16384));
|
|
+ proxy_os = psock.getOutputStream();
|
|
+ } catch(Exception e) {
|
|
+ dbg("psocket prob: " + e.getMessage());
|
|
+ return null;
|
|
+ }
|
|
+
|
|
+ return psock;
|
|
+ }
|
|
+
|
|
+ String readline(DataInputStream i) {
|
|
+ byte[] ba = new byte[1];
|
|
+ String s = new String("");
|
|
+ ba[0] = 0;
|
|
+ try {
|
|
+ while (ba[0] != 0xa) {
|
|
+ ba[0] = (byte) i.readUnsignedByte();
|
|
+ s += new String(ba);
|
|
+ }
|
|
+ } catch (Exception e) {
|
|
+ ;
|
|
+ }
|
|
+ return s;
|
|
+ }
|
|
+}
|
|
+
|
|
+class TrustDialog implements ActionListener {
|
|
+ String msg, host, text;
|
|
+ int port;
|
|
+ java.security.cert.Certificate[] trustallCerts = null;
|
|
+ boolean viewing_cert = false;
|
|
+ boolean trust_this_session = false;
|
|
+
|
|
+ /*
|
|
+ * this is the gui to show the user the cert and info and ask
|
|
+ * them if they want to continue using this cert.
|
|
+ */
|
|
+
|
|
+ Button ok, cancel, viewcert;
|
|
+ TextArea textarea;
|
|
+ Checkbox accept, deny;
|
|
+ Dialog dialog;
|
|
+
|
|
+ String s1 = "Accept this certificate temporarily for this session";
|
|
+ String s2 = "Do not accept this certificate and do not connect to"
|
|
+ + " this VNC server";
|
|
+ String ln = "\n---------------------------------------------------\n\n";
|
|
+
|
|
+ TrustDialog (String h, int p, java.security.cert.Certificate[] s) {
|
|
+ host = h;
|
|
+ port = p;
|
|
+ trustallCerts = s;
|
|
+
|
|
+ msg = "VNC Server " + host + ":" + port + " Not Verified";
|
|
+ }
|
|
+
|
|
+ public boolean queryUser(String reason) {
|
|
+
|
|
+ /* create and display the dialog for unverified cert. */
|
|
+
|
|
+ Frame frame = new Frame(msg);
|
|
+
|
|
+ dialog = new Dialog(frame, true);
|
|
+
|
|
+ String infostr = "";
|
|
+ if (trustallCerts.length == 1) {
|
|
+ CertInfo ci = new CertInfo(trustallCerts[0]);
|
|
+ infostr = ci.get_certinfo("all");
|
|
+ }
|
|
+ if (reason != null) {
|
|
+ reason += "\n\n";
|
|
+ }
|
|
+
|
|
+ text = "\n"
|
|
++ "Unable to verify the identity of\n"
|
|
++ "\n"
|
|
++ " " + host + ":" + port + "\n"
|
|
++ "\n"
|
|
++ infostr
|
|
++ "\n"
|
|
++ "as a trusted VNC server.\n"
|
|
++ "\n"
|
|
++ reason
|
|
++ "In General not being able to verify the VNC Server and/or your seeing this Dialog\n"
|
|
++ "is due to one of the following:\n"
|
|
++ "\n"
|
|
++ " - Your requesting to View the Certificate before accepting.\n"
|
|
++ "\n"
|
|
++ " - The VNC server is using a Self-Signed Certificate or a Certificate\n"
|
|
++ " Authority not recognized by your Web Browser or Java Plugin runtime.\n"
|
|
++ "\n"
|
|
++ " - The use of an Apache SSL portal scheme employing CONNECT proxying AND\n"
|
|
++ " the Apache Web server has a certificate *different* from the VNC server's.\n"
|
|
++ "\n"
|
|
++ " - No previously accepted Certificate (via Web Broswer/Java Plugin) could be\n"
|
|
++ " obtained by this applet to compare the VNC Server Certificate against.\n"
|
|
++ "\n"
|
|
++ " - The VNC Server's Certificate does not match the one specified in the\n"
|
|
++ " supplied 'serverCert' Java Applet Parameter.\n"
|
|
++ "\n"
|
|
++ " - A Man-In-The-Middle attack impersonating as the VNC server that you wish\n"
|
|
++ " to connect to. (Wouldn't that be exciting!!)\n"
|
|
++ "\n"
|
|
++ "By safely copying the VNC server's Certificate (or using a common Certificate\n"
|
|
++ "Authority certificate) you can configure your Web Browser and Java Plugin to\n"
|
|
++ "automatically authenticate this VNC Server.\n"
|
|
++ "\n"
|
|
++ "If you do so, then you will only have to click \"Yes\" when this VNC Viewer\n"
|
|
++ "applet asks you whether to trust your Browser/Java Plugin's acceptance of the\n"
|
|
++ "certificate (except for the Apache portal case above where they don't match.)\n"
|
|
++ "\n"
|
|
++ "You can also set the applet parameter 'trustUrlVncCert=yes' to automatically\n"
|
|
++ "accept certificates already accepted/trusted by your Web Browser/Java Plugin,\n"
|
|
++ "and thereby see no dialog from this VNC Viewer applet.\n"
|
|
+;
|
|
+
|
|
+ /* the accept / do-not-accept radio buttons: */
|
|
+ CheckboxGroup checkbox = new CheckboxGroup();
|
|
+ accept = new Checkbox(s1, true, checkbox);
|
|
+ deny = new Checkbox(s2, false, checkbox);
|
|
+
|
|
+ /* put the checkboxes in a panel: */
|
|
+ Panel check = new Panel();
|
|
+ check.setLayout(new GridLayout(2, 1));
|
|
+
|
|
+ check.add(accept);
|
|
+ check.add(deny);
|
|
+
|
|
+ /* make the 3 buttons: */
|
|
+ ok = new Button("OK");
|
|
+ cancel = new Button("Cancel");
|
|
+ viewcert = new Button("View Certificate");
|
|
+
|
|
+ ok.addActionListener(this);
|
|
+ cancel.addActionListener(this);
|
|
+ viewcert.addActionListener(this);
|
|
+
|
|
+ /* put the buttons in their own panel: */
|
|
+ Panel buttonrow = new Panel();
|
|
+ buttonrow.setLayout(new FlowLayout(FlowLayout.LEFT));
|
|
+ buttonrow.add(viewcert);
|
|
+ buttonrow.add(ok);
|
|
+ buttonrow.add(cancel);
|
|
+
|
|
+ /* label at the top: */
|
|
+ Label label = new Label(msg, Label.CENTER);
|
|
+ label.setFont(new Font("Helvetica", Font.BOLD, 16));
|
|
+
|
|
+ /* textarea in the middle */
|
|
+ textarea = new TextArea(text, 38, 64,
|
|
+ TextArea.SCROLLBARS_VERTICAL_ONLY);
|
|
+ textarea.setEditable(false);
|
|
+
|
|
+ /* put the two panels in their own panel at bottom: */
|
|
+ Panel bot = new Panel();
|
|
+ bot.setLayout(new GridLayout(2, 1));
|
|
+ bot.add(check);
|
|
+ bot.add(buttonrow);
|
|
+
|
|
+ /* now arrange things inside the dialog: */
|
|
+ dialog.setLayout(new BorderLayout());
|
|
+
|
|
+ dialog.add("North", label);
|
|
+ dialog.add("South", bot);
|
|
+ dialog.add("Center", textarea);
|
|
+
|
|
+ dialog.pack();
|
|
+ dialog.resize(dialog.preferredSize());
|
|
+
|
|
+ dialog.show(); /* block here til OK or Cancel pressed. */
|
|
+
|
|
+ return trust_this_session;
|
|
+ }
|
|
+
|
|
+ public synchronized void actionPerformed(ActionEvent evt) {
|
|
+
|
|
+ if (evt.getSource() == viewcert) {
|
|
+ /* View Certificate button clicked */
|
|
+ if (viewing_cert) {
|
|
+ /* show the original info text: */
|
|
+ textarea.setText(text);
|
|
+ viewcert.setLabel("View Certificate");
|
|
+ viewing_cert = false;
|
|
+ } else {
|
|
+ int i;
|
|
+ /* show all (likely just one) certs: */
|
|
+ textarea.setText("");
|
|
+ for (i=0; i < trustallCerts.length; i++) {
|
|
+ int j = i + 1;
|
|
+ textarea.append("Certificate[" +
|
|
+ j + "]\n\n");
|
|
+ textarea.append(
|
|
+ trustallCerts[i].toString());
|
|
+ textarea.append(ln);
|
|
+ }
|
|
+ viewcert.setLabel("View Info");
|
|
+ viewing_cert = true;
|
|
+
|
|
+ textarea.setCaretPosition(0);
|
|
+ }
|
|
+
|
|
+ } else if (evt.getSource() == ok) {
|
|
+ /* OK button clicked */
|
|
+ if (accept.getState()) {
|
|
+ trust_this_session = true;
|
|
+ } else {
|
|
+ trust_this_session = false;
|
|
+ }
|
|
+ //dialog.dispose();
|
|
+ dialog.hide();
|
|
+
|
|
+ } else if (evt.getSource() == cancel) {
|
|
+ /* Cancel button clicked */
|
|
+ trust_this_session = false;
|
|
+
|
|
+ //dialog.dispose();
|
|
+ dialog.hide();
|
|
+ }
|
|
+ }
|
|
+
|
|
+ String get_certinfo() {
|
|
+ String all = "";
|
|
+ String fields[] = {"CN", "OU", "O", "L", "C"};
|
|
+ int i;
|
|
+ if (trustallCerts.length < 1) {
|
|
+ all = "";
|
|
+ return all;
|
|
+ }
|
|
+ String cert = trustallCerts[0].toString();
|
|
+
|
|
+ /*
|
|
+ * For now we simply scrape the cert string, there must
|
|
+ * be an API for this... perhaps optionValue?
|
|
+ */
|
|
+
|
|
+ for (i=0; i < fields.length; i++) {
|
|
+ int f, t, t1, t2;
|
|
+ String sub, mat = fields[i] + "=";
|
|
+
|
|
+ f = cert.indexOf(mat, 0);
|
|
+ if (f > 0) {
|
|
+ t1 = cert.indexOf(", ", f);
|
|
+ t2 = cert.indexOf("\n", f);
|
|
+ if (t1 < 0 && t2 < 0) {
|
|
+ continue;
|
|
+ } else if (t1 < 0) {
|
|
+ t = t2;
|
|
+ } else if (t2 < 0) {
|
|
+ t = t1;
|
|
+ } else if (t1 < t2) {
|
|
+ t = t1;
|
|
+ } else {
|
|
+ t = t2;
|
|
+ }
|
|
+ if (t > f) {
|
|
+ sub = cert.substring(f, t);
|
|
+ all = all + " " + sub + "\n";
|
|
+ }
|
|
+ }
|
|
+ }
|
|
+ return all;
|
|
+ }
|
|
+}
|
|
+
|
|
+class ProxyDialog implements ActionListener {
|
|
+ String guessedHost = null;
|
|
+ String guessedPort = null;
|
|
+ /*
|
|
+ * this is the gui to show the user the cert and info and ask
|
|
+ * them if they want to continue using this cert.
|
|
+ */
|
|
+
|
|
+ Button ok;
|
|
+ Dialog dialog;
|
|
+ TextField entry;
|
|
+ String reply = "";
|
|
+
|
|
+ ProxyDialog (String h, int p) {
|
|
+ guessedHost = h;
|
|
+ try {
|
|
+ guessedPort = Integer.toString(p);
|
|
+ } catch (Exception e) {
|
|
+ guessedPort = "8080";
|
|
+ }
|
|
+ }
|
|
+
|
|
+ public void queryUser() {
|
|
+
|
|
+ /* create and display the dialog for unverified cert. */
|
|
+
|
|
+ Frame frame = new Frame("Need Proxy host:port");
|
|
+
|
|
+ dialog = new Dialog(frame, true);
|
|
+
|
|
+
|
|
+ Label label = new Label("Please Enter your https Proxy info as host:port", Label.CENTER);
|
|
+ //label.setFont(new Font("Helvetica", Font.BOLD, 16));
|
|
+ entry = new TextField(30);
|
|
+ ok = new Button("OK");
|
|
+ ok.addActionListener(this);
|
|
+
|
|
+ String guess = "";
|
|
+ if (guessedHost != null) {
|
|
+ guess = guessedHost + ":" + guessedPort;
|
|
+ }
|
|
+ entry.setText(guess);
|
|
+
|
|
+ dialog.setLayout(new BorderLayout());
|
|
+ dialog.add("North", label);
|
|
+ dialog.add("Center", entry);
|
|
+ dialog.add("South", ok);
|
|
+ dialog.pack();
|
|
+ dialog.resize(dialog.preferredSize());
|
|
+
|
|
+ dialog.show(); /* block here til OK or Cancel pressed. */
|
|
+ return;
|
|
+ }
|
|
+
|
|
+ public String getHost() {
|
|
+ int i = reply.indexOf(":");
|
|
+ if (i < 0) {
|
|
+ return "unknown";
|
|
+ }
|
|
+ String h = reply.substring(0, i);
|
|
+ return h;
|
|
+ }
|
|
+
|
|
+ public int getPort() {
|
|
+ int i = reply.indexOf(":");
|
|
+ int p = 8080;
|
|
+ if (i < 0) {
|
|
+ return p;
|
|
+ }
|
|
+ i++;
|
|
+ String ps = reply.substring(i);
|
|
+ try {
|
|
+ Integer I = new Integer(ps);
|
|
+ p = I.intValue();
|
|
+ } catch (Exception e) {
|
|
+ ;
|
|
+ }
|
|
+ return p;
|
|
+ }
|
|
+
|
|
+ public synchronized void actionPerformed(ActionEvent evt) {
|
|
+ System.out.println(evt.getActionCommand());
|
|
+ if (evt.getSource() == ok) {
|
|
+ reply = entry.getText();
|
|
+ //dialog.dispose();
|
|
+ dialog.hide();
|
|
+ }
|
|
+ }
|
|
+}
|
|
+
|
|
+class ProxyPasswdDialog implements ActionListener {
|
|
+ String guessedHost = null;
|
|
+ String guessedPort = null;
|
|
+ String guessedUser = null;
|
|
+ String guessedPasswd = null;
|
|
+ String realm = null;
|
|
+ /*
|
|
+ * this is the gui to show the user the cert and info and ask
|
|
+ * them if they want to continue using this cert.
|
|
+ */
|
|
+
|
|
+ Button ok;
|
|
+ Dialog dialog;
|
|
+ TextField entry1;
|
|
+ TextField entry2;
|
|
+ String reply1 = "";
|
|
+ String reply2 = "";
|
|
+
|
|
+ ProxyPasswdDialog (String h, int p, String realm) {
|
|
+ guessedHost = h;
|
|
+ try {
|
|
+ guessedPort = Integer.toString(p);
|
|
+ } catch (Exception e) {
|
|
+ guessedPort = "8080";
|
|
+ }
|
|
+ this.realm = realm;
|
|
+ }
|
|
+
|
|
+ public void queryUser() {
|
|
+
|
|
+ /* create and display the dialog for unverified cert. */
|
|
+
|
|
+ Frame frame = new Frame("Proxy Requires Username and Password");
|
|
+
|
|
+ dialog = new Dialog(frame, true);
|
|
+
|
|
+ //Label label = new Label("Please Enter your Web Proxy Username in the top Entry and Password in the bottom Entry", Label.CENTER);
|
|
+ TextArea label = new TextArea("Please Enter your Web Proxy\nUsername in the Top Entry and\nPassword in the Bottom Entry,\nand then press OK.", 4, 20, TextArea.SCROLLBARS_NONE);
|
|
+ entry1 = new TextField(30);
|
|
+ entry2 = new TextField(30);
|
|
+ entry2.setEchoChar('*');
|
|
+ ok = new Button("OK");
|
|
+ ok.addActionListener(this);
|
|
+
|
|
+ dialog.setLayout(new BorderLayout());
|
|
+ dialog.add("North", label);
|
|
+ dialog.add("Center", entry1);
|
|
+ dialog.add("South", entry2);
|
|
+ dialog.add("East", ok);
|
|
+ dialog.pack();
|
|
+ dialog.resize(dialog.preferredSize());
|
|
+
|
|
+ dialog.show(); /* block here til OK or Cancel pressed. */
|
|
+ return;
|
|
+ }
|
|
+
|
|
+ public String getAuth() {
|
|
+ return reply1 + ":" + reply2;
|
|
+ }
|
|
+
|
|
+ public synchronized void actionPerformed(ActionEvent evt) {
|
|
+ System.out.println(evt.getActionCommand());
|
|
+ if (evt.getSource() == ok) {
|
|
+ reply1 = entry1.getText();
|
|
+ reply2 = entry2.getText();
|
|
+ //dialog.dispose();
|
|
+ dialog.hide();
|
|
+ }
|
|
+ }
|
|
+}
|
|
+
|
|
+class ClientCertDialog implements ActionListener {
|
|
+
|
|
+ Button ok;
|
|
+ Dialog dialog;
|
|
+ TextField entry;
|
|
+ String reply = "";
|
|
+
|
|
+ ClientCertDialog() {
|
|
+ ;
|
|
+ }
|
|
+
|
|
+ public String queryUser() {
|
|
+
|
|
+ /* create and display the dialog for unverified cert. */
|
|
+
|
|
+ Frame frame = new Frame("Enter SSL Client Cert+Key String");
|
|
+
|
|
+ dialog = new Dialog(frame, true);
|
|
+
|
|
+
|
|
+ Label label = new Label("Please Enter the SSL Client Cert+Key String 308204c0...,...522d2d0a", Label.CENTER);
|
|
+ entry = new TextField(30);
|
|
+ ok = new Button("OK");
|
|
+ ok.addActionListener(this);
|
|
+
|
|
+ dialog.setLayout(new BorderLayout());
|
|
+ dialog.add("North", label);
|
|
+ dialog.add("Center", entry);
|
|
+ dialog.add("South", ok);
|
|
+ dialog.pack();
|
|
+ dialog.resize(dialog.preferredSize());
|
|
+
|
|
+ dialog.show(); /* block here til OK or Cancel pressed. */
|
|
+ return reply;
|
|
+ }
|
|
+
|
|
+ public synchronized void actionPerformed(ActionEvent evt) {
|
|
+ System.out.println(evt.getActionCommand());
|
|
+ if (evt.getSource() == ok) {
|
|
+ reply = entry.getText();
|
|
+ //dialog.dispose();
|
|
+ dialog.hide();
|
|
+ }
|
|
+ }
|
|
+}
|
|
+
|
|
+class BrowserCertsDialog implements ActionListener {
|
|
+ Button yes, no;
|
|
+ Dialog dialog;
|
|
+ String vncServer;
|
|
+ String hostport;
|
|
+ public boolean showCertDialog = true;
|
|
+
|
|
+ BrowserCertsDialog(String serv, String hp) {
|
|
+ vncServer = serv;
|
|
+ hostport = hp;
|
|
+ }
|
|
+
|
|
+ public void queryUser() {
|
|
+
|
|
+ /* create and display the dialog for unverified cert. */
|
|
+
|
|
+ Frame frame = new Frame("Use Browser/JVM Certs?");
|
|
+
|
|
+ dialog = new Dialog(frame, true);
|
|
+
|
|
+ String m = "";
|
|
+m += "\n";
|
|
+m += "This VNC Viewer applet does not have its own keystore to track\n";
|
|
+m += "SSL certificates, and so cannot authenticate the certificate\n";
|
|
+m += "of the VNC Server:\n";
|
|
+m += "\n";
|
|
+m += " " + hostport + "\n\n " + vncServer + "\n";
|
|
+m += "\n";
|
|
+m += "on its own.\n";
|
|
+m += "\n";
|
|
+m += "However, it has noticed that your Web Browser and/or Java VM Plugin\n";
|
|
+m += "has previously accepted the same certificate. You may have set\n";
|
|
+m += "this up permanently or just for this session, or the server\n";
|
|
+m += "certificate was signed by a CA cert that your Web Browser or\n";
|
|
+m += "Java VM Plugin has.\n";
|
|
+m += "\n";
|
|
+m += "If the VNC Server connection times out while you are reading this\n";
|
|
+m += "dialog, then restart the connection and try again.\n";
|
|
+m += "\n";
|
|
+m += "Should this VNC Viewer applet now connect to the above VNC server?\n";
|
|
+m += "\n";
|
|
+
|
|
+ TextArea textarea = new TextArea(m, 22, 64,
|
|
+ TextArea.SCROLLBARS_VERTICAL_ONLY);
|
|
+ textarea.setEditable(false);
|
|
+ yes = new Button("Yes");
|
|
+ yes.addActionListener(this);
|
|
+ no = new Button("No, Let Me See the Certificate.");
|
|
+ no.addActionListener(this);
|
|
+
|
|
+ dialog.setLayout(new BorderLayout());
|
|
+ dialog.add("North", textarea);
|
|
+ dialog.add("Center", yes);
|
|
+ dialog.add("South", no);
|
|
+ dialog.pack();
|
|
+ dialog.resize(dialog.preferredSize());
|
|
+
|
|
+ dialog.show(); /* block here til Yes or No pressed. */
|
|
+ System.out.println("done show()");
|
|
+ return;
|
|
+ }
|
|
+
|
|
+ public synchronized void actionPerformed(ActionEvent evt) {
|
|
+ System.out.println(evt.getActionCommand());
|
|
+ if (evt.getSource() == yes) {
|
|
+ showCertDialog = false;
|
|
+ //dialog.dispose();
|
|
+ dialog.hide();
|
|
+ } else if (evt.getSource() == no) {
|
|
+ showCertDialog = true;
|
|
+ //dialog.dispose();
|
|
+ dialog.hide();
|
|
+ }
|
|
+ System.out.println("done actionPerformed()");
|
|
+ }
|
|
+}
|
|
+
|
|
+class CertInfo {
|
|
+ String fields[] = {"CN", "OU", "O", "L", "C"};
|
|
+ java.security.cert.Certificate cert;
|
|
+ String certString = "";
|
|
+
|
|
+ CertInfo(java.security.cert.Certificate c) {
|
|
+ cert = c;
|
|
+ certString = cert.toString();
|
|
+ }
|
|
+
|
|
+ String get_certinfo(String which) {
|
|
+ int i;
|
|
+ String cs = new String(certString);
|
|
+ String all = "";
|
|
+
|
|
+ /*
|
|
+ * For now we simply scrape the cert string, there must
|
|
+ * be an API for this... perhaps optionValue?
|
|
+ */
|
|
+ for (i=0; i < fields.length; i++) {
|
|
+ int f, t, t1, t2;
|
|
+ String sub, mat = fields[i] + "=";
|
|
+
|
|
+ f = cs.indexOf(mat, 0);
|
|
+ if (f > 0) {
|
|
+ t1 = cs.indexOf(", ", f);
|
|
+ t2 = cs.indexOf("\n", f);
|
|
+ if (t1 < 0 && t2 < 0) {
|
|
+ continue;
|
|
+ } else if (t1 < 0) {
|
|
+ t = t2;
|
|
+ } else if (t2 < 0) {
|
|
+ t = t1;
|
|
+ } else if (t1 < t2) {
|
|
+ t = t1;
|
|
+ } else {
|
|
+ t = t2;
|
|
+ }
|
|
+ if (t > f) {
|
|
+ sub = cs.substring(f, t);
|
|
+ all = all + " " + sub + "\n";
|
|
+ if (which.equals(fields[i])) {
|
|
+ return sub;
|
|
+ }
|
|
+ }
|
|
+ }
|
|
+ }
|
|
+ if (which.equals("all")) {
|
|
+ return all;
|
|
+ } else {
|
|
+ return "";
|
|
+ }
|
|
+ }
|
|
+}
|
|
+
|
|
+class Base64Coder {
|
|
+
|
|
+ // Mapping table from 6-bit nibbles to Base64 characters.
|
|
+ private static char[] map1 = new char[64];
|
|
+ static {
|
|
+ int i=0;
|
|
+ for (char c='A'; c<='Z'; c++) map1[i++] = c;
|
|
+ for (char c='a'; c<='z'; c++) map1[i++] = c;
|
|
+ for (char c='0'; c<='9'; c++) map1[i++] = c;
|
|
+ map1[i++] = '+'; map1[i++] = '/'; }
|
|
+
|
|
+ // Mapping table from Base64 characters to 6-bit nibbles.
|
|
+ private static byte[] map2 = new byte[128];
|
|
+ static {
|
|
+ for (int i=0; i<map2.length; i++) map2[i] = -1;
|
|
+ for (int i=0; i<64; i++) map2[map1[i]] = (byte)i; }
|
|
+
|
|
+ /**
|
|
+ * Encodes a string into Base64 format.
|
|
+ * No blanks or line breaks are inserted.
|
|
+ * @param s a String to be encoded.
|
|
+ * @return A String with the Base64 encoded data.
|
|
+ */
|
|
+ public static String encodeString (String s) {
|
|
+ return new String(encode(s.getBytes())); }
|
|
+
|
|
+ /**
|
|
+ * Encodes a byte array into Base64 format.
|
|
+ * No blanks or line breaks are inserted.
|
|
+ * @param in an array containing the data bytes to be encoded.
|
|
+ * @return A character array with the Base64 encoded data.
|
|
+ */
|
|
+ public static char[] encode (byte[] in) {
|
|
+ return encode(in,in.length); }
|
|
+
|
|
+ /**
|
|
+ * Encodes a byte array into Base64 format.
|
|
+ * No blanks or line breaks are inserted.
|
|
+ * @param in an array containing the data bytes to be encoded.
|
|
+ * @param iLen number of bytes to process in <code>in</code>.
|
|
+ * @return A character array with the Base64 encoded data.
|
|
+ */
|
|
+ public static char[] encode (byte[] in, int iLen) {
|
|
+ int oDataLen = (iLen*4+2)/3; // output length without padding
|
|
+ int oLen = ((iLen+2)/3)*4; // output length including padding
|
|
+ char[] out = new char[oLen];
|
|
+ int ip = 0;
|
|
+ int op = 0;
|
|
+ while (ip < iLen) {
|
|
+ int i0 = in[ip++] & 0xff;
|
|
+ int i1 = ip < iLen ? in[ip++] & 0xff : 0;
|
|
+ int i2 = ip < iLen ? in[ip++] & 0xff : 0;
|
|
+ int o0 = i0 >>> 2;
|
|
+ int o1 = ((i0 & 3) << 4) | (i1 >>> 4);
|
|
+ int o2 = ((i1 & 0xf) << 2) | (i2 >>> 6);
|
|
+ int o3 = i2 & 0x3F;
|
|
+ out[op++] = map1[o0];
|
|
+ out[op++] = map1[o1];
|
|
+ out[op] = op < oDataLen ? map1[o2] : '='; op++;
|
|
+ out[op] = op < oDataLen ? map1[o3] : '='; op++; }
|
|
+ return out; }
|
|
+
|
|
+ /**
|
|
+ * Decodes a string from Base64 format.
|
|
+ * @param s a Base64 String to be decoded.
|
|
+ * @return A String containing the decoded data.
|
|
+ * @throws IllegalArgumentException if the input is not valid Base64 encoded data.
|
|
+ */
|
|
+ public static String decodeString (String s) {
|
|
+ return new String(decode(s)); }
|
|
+
|
|
+ /**
|
|
+ * Decodes a byte array from Base64 format.
|
|
+ * @param s a Base64 String to be decoded.
|
|
+ * @return An array containing the decoded data bytes.
|
|
+ * @throws IllegalArgumentException if the input is not valid Base64 encoded data.
|
|
+ */
|
|
+ public static byte[] decode (String s) {
|
|
+ return decode(s.toCharArray()); }
|
|
+
|
|
+ /**
|
|
+ * Decodes a byte array from Base64 format.
|
|
+ * No blanks or line breaks are allowed within the Base64 encoded data.
|
|
+ * @param in a character array containing the Base64 encoded data.
|
|
+ * @return An array containing the decoded data bytes.
|
|
+ * @throws IllegalArgumentException if the input is not valid Base64 encoded data.
|
|
+ */
|
|
+ public static byte[] decode (char[] in) {
|
|
+ int iLen = in.length;
|
|
+ if (iLen%4 != 0) throw new IllegalArgumentException ("Length of Base64 encoded input string is not a multiple of 4.");
|
|
+ while (iLen > 0 && in[iLen-1] == '=') iLen--;
|
|
+ int oLen = (iLen*3) / 4;
|
|
+ byte[] out = new byte[oLen];
|
|
+ int ip = 0;
|
|
+ int op = 0;
|
|
+ while (ip < iLen) {
|
|
+ int i0 = in[ip++];
|
|
+ int i1 = in[ip++];
|
|
+ int i2 = ip < iLen ? in[ip++] : 'A';
|
|
+ int i3 = ip < iLen ? in[ip++] : 'A';
|
|
+ if (i0 > 127 || i1 > 127 || i2 > 127 || i3 > 127)
|
|
+ throw new IllegalArgumentException ("Illegal character in Base64 encoded data.");
|
|
+ int b0 = map2[i0];
|
|
+ int b1 = map2[i1];
|
|
+ int b2 = map2[i2];
|
|
+ int b3 = map2[i3];
|
|
+ if (b0 < 0 || b1 < 0 || b2 < 0 || b3 < 0)
|
|
+ throw new IllegalArgumentException ("Illegal character in Base64 encoded data.");
|
|
+ int o0 = ( b0 <<2) | (b1>>>4);
|
|
+ int o1 = ((b1 & 0xf)<<4) | (b2>>>2);
|
|
+ int o2 = ((b2 & 3)<<6) | b3;
|
|
+ out[op++] = (byte)o0;
|
|
+ if (op<oLen) out[op++] = (byte)o1;
|
|
+ if (op<oLen) out[op++] = (byte)o2; }
|
|
+ return out; }
|
|
+
|
|
+ // Dummy constructor.
|
|
+ private Base64Coder() {}
|
|
+
|
|
+}
|
|
diff -Naur JavaViewer.orig/VncCanvas.java JavaViewer/VncCanvas.java
|
|
--- JavaViewer.orig/VncCanvas.java 2005-11-21 18:50:18.000000000 -0500
|
|
+++ JavaViewer/VncCanvas.java 2010-11-30 22:57:50.000000000 -0500
|
|
@@ -27,6 +27,13 @@
|
|
import java.lang.*;
|
|
import java.util.zip.*;
|
|
|
|
+// begin runge/x11vnc
|
|
+import java.util.Collections;
|
|
+// end runge/x11vnc
|
|
+
|
|
+// begin runge/x11vnc
|
|
+// all the MouseWheel stuff below.
|
|
+// end runge/x11vnc
|
|
|
|
//
|
|
// VncCanvas is a subclass of Canvas which draws a VNC desktop on it.
|
|
@@ -34,7 +41,7 @@
|
|
|
|
class VncCanvas
|
|
extends Canvas
|
|
- implements KeyListener, MouseListener, MouseMotionListener {
|
|
+ implements KeyListener, MouseListener, MouseMotionListener, MouseWheelListener {
|
|
|
|
VncViewer viewer;
|
|
RfbProto rfb;
|
|
@@ -85,6 +92,22 @@
|
|
|
|
cm24 = new DirectColorModel(24, 0xFF0000, 0x00FF00, 0x0000FF);
|
|
|
|
+// begin runge/x11vnc
|
|
+// kludge to not show any Java cursor in the canvas since we are
|
|
+// showing the soft cursor (should be a user setting...)
|
|
+Cursor dot = Toolkit.getDefaultToolkit().createCustomCursor(
|
|
+ Toolkit.getDefaultToolkit().createImage(new byte[4]), new Point(0,0),
|
|
+ "dot");
|
|
+this.setCursor(dot);
|
|
+
|
|
+// while we are at it... get rid of the keyboard traversals that
|
|
+// make it so we can't type a Tab character:
|
|
+this.setFocusTraversalKeys(KeyboardFocusManager.FORWARD_TRAVERSAL_KEYS,
|
|
+ Collections.EMPTY_SET);
|
|
+this.setFocusTraversalKeys(KeyboardFocusManager.BACKWARD_TRAVERSAL_KEYS,
|
|
+ Collections.EMPTY_SET);
|
|
+// end runge/x11vnc
|
|
+
|
|
colors = new Color[256];
|
|
// sf@2005 - Now Default
|
|
for (int i = 0; i < 256; i++)
|
|
@@ -186,6 +209,7 @@
|
|
inputEnabled = true;
|
|
addMouseListener(this);
|
|
addMouseMotionListener(this);
|
|
+ addMouseWheelListener(this);
|
|
if (viewer.showControls) {
|
|
viewer.buttonPanel.enableRemoteAccessControls(true);
|
|
}
|
|
@@ -193,6 +217,7 @@
|
|
inputEnabled = false;
|
|
removeMouseListener(this);
|
|
removeMouseMotionListener(this);
|
|
+ removeMouseWheelListener(this);
|
|
if (viewer.showControls) {
|
|
viewer.buttonPanel.enableRemoteAccessControls(false);
|
|
}
|
|
@@ -202,6 +227,9 @@
|
|
|
|
public void setPixelFormat() throws IOException {
|
|
// sf@2005 - Adding more color modes
|
|
+ if (viewer.graftFtp) {
|
|
+ return;
|
|
+ }
|
|
if (viewer.options.eightBitColors > 0)
|
|
{
|
|
viewer.options.oldEightBitColors = viewer.options.eightBitColors;
|
|
@@ -237,6 +265,9 @@
|
|
}
|
|
else
|
|
{
|
|
+// begin runge/x11vnc
|
|
+ viewer.options.oldEightBitColors = viewer.options.eightBitColors;
|
|
+// end runge/x11vnc
|
|
rfb.writeSetPixelFormat(
|
|
32,
|
|
24,
|
|
@@ -376,12 +407,14 @@
|
|
// Start/stop session recording if necessary.
|
|
viewer.checkRecordingStatus();
|
|
|
|
- rfb.writeFramebufferUpdateRequest(
|
|
- 0,
|
|
- 0,
|
|
- rfb.framebufferWidth,
|
|
- rfb.framebufferHeight,
|
|
- false);
|
|
+ if (!viewer.graftFtp) {
|
|
+ rfb.writeFramebufferUpdateRequest(
|
|
+ 0,
|
|
+ 0,
|
|
+ rfb.framebufferWidth,
|
|
+ rfb.framebufferHeight,
|
|
+ false);
|
|
+ }
|
|
|
|
//
|
|
// main dispatch loop
|
|
@@ -390,6 +423,9 @@
|
|
while (true) {
|
|
// Read message type from the server.
|
|
int msgType = rfb.readServerMessageType();
|
|
+ if (viewer.ftpOnly && msgType != RfbProto.rfbFileTransfer) {
|
|
+ System.out.println("msgType:" + msgType);
|
|
+ }
|
|
|
|
// Process the message depending on its type.
|
|
switch (msgType) {
|
|
@@ -1332,6 +1368,9 @@
|
|
public void mouseDragged(MouseEvent evt) {
|
|
processLocalMouseEvent(evt, true);
|
|
}
|
|
+ public void mouseWheelMoved(MouseWheelEvent evt) {
|
|
+ processLocalMouseWheelEvent(evt);
|
|
+ }
|
|
|
|
public void processLocalKeyEvent(KeyEvent evt) {
|
|
if (viewer.rfb != null && rfb.inNormalProtocol) {
|
|
@@ -1367,6 +1406,19 @@
|
|
evt.consume();
|
|
}
|
|
|
|
+ public void processLocalMouseWheelEvent(MouseWheelEvent evt) {
|
|
+ if (viewer.rfb != null && rfb.inNormalProtocol) {
|
|
+ synchronized(rfb) {
|
|
+ try {
|
|
+ rfb.writeWheelEvent(evt);
|
|
+ } catch (Exception e) {
|
|
+ e.printStackTrace();
|
|
+ }
|
|
+ rfb.notify();
|
|
+ }
|
|
+ }
|
|
+ }
|
|
+
|
|
public void processLocalMouseEvent(MouseEvent evt, boolean moved) {
|
|
if (viewer.rfb != null && rfb.inNormalProtocol) {
|
|
if (moved) {
|
|
@@ -1532,9 +1584,14 @@
|
|
else
|
|
{
|
|
result =
|
|
- 0xFF000000 | (pixBuf[i * 4 + 1] & 0xFF)
|
|
- << 16 | (pixBuf[i * 4 + 2] & 0xFF)
|
|
- << 8 | (pixBuf[i * 4 + 3] & 0xFF);
|
|
+// begin runge/x11vnc
|
|
+// 0xFF000000 | (pixBuf[i * 4 + 1] & 0xFF)
|
|
+// << 16 | (pixBuf[i * 4 + 2] & 0xFF)
|
|
+// << 8 | (pixBuf[i * 4 + 3] & 0xFF);
|
|
+ 0xFF000000 | (pixBuf[i * 4 + 2] & 0xFF)
|
|
+ << 16 | (pixBuf[i * 4 + 1] & 0xFF)
|
|
+ << 8 | (pixBuf[i * 4 + 0] & 0xFF);
|
|
+// end runge/x11vnc
|
|
}
|
|
} else {
|
|
result = 0; // Transparent pixel
|
|
@@ -1565,9 +1622,14 @@
|
|
else
|
|
{
|
|
result =
|
|
- 0xFF000000 | (pixBuf[i * 4 + 1] & 0xFF)
|
|
- << 16 | (pixBuf[i * 4 + 2] & 0xFF)
|
|
- << 8 | (pixBuf[i * 4 + 3] & 0xFF);
|
|
+// begin runge/x11vnc
|
|
+// 0xFF000000 | (pixBuf[i * 4 + 1] & 0xFF)
|
|
+// << 16 | (pixBuf[i * 4 + 2] & 0xFF)
|
|
+// << 8 | (pixBuf[i * 4 + 3] & 0xFF);
|
|
+ 0xFF000000 | (pixBuf[i * 4 + 2] & 0xFF)
|
|
+ << 16 | (pixBuf[i * 4 + 1] & 0xFF)
|
|
+ << 8 | (pixBuf[i * 4 + 0] & 0xFF);
|
|
+// end runge/x11vnc
|
|
}
|
|
} else {
|
|
result = 0; // Transparent pixel
|
|
diff -Naur JavaViewer.orig/VncViewer.java JavaViewer/VncViewer.java
|
|
--- JavaViewer.orig/VncViewer.java 2006-05-24 15:14:40.000000000 -0400
|
|
+++ JavaViewer/VncViewer.java 2010-03-27 18:00:28.000000000 -0400
|
|
@@ -41,6 +41,7 @@
|
|
import java.io.*;
|
|
import java.net.*;
|
|
import javax.swing.*;
|
|
+import java.util.Date;
|
|
|
|
public class VncViewer extends java.applet.Applet
|
|
implements java.lang.Runnable, WindowListener {
|
|
@@ -80,11 +81,11 @@
|
|
GridBagLayout gridbag;
|
|
ButtonPanel buttonPanel;
|
|
AuthPanel authenticator;
|
|
- VncCanvas vc;
|
|
+ VncCanvas vc = null;
|
|
OptionsFrame options;
|
|
ClipboardFrame clipboard;
|
|
RecordingFrame rec;
|
|
- FTPFrame ftp; // KMC: FTP Frame declaration
|
|
+ FTPFrame ftp = null; // KMC: FTP Frame declaration
|
|
|
|
// Control session recording.
|
|
Object recordingSync;
|
|
@@ -96,7 +97,7 @@
|
|
|
|
// Variables read from parameter values.
|
|
String host;
|
|
- int port;
|
|
+ int port, vncserverport;
|
|
String passwordParam;
|
|
String encPasswordParam;
|
|
boolean showControls;
|
|
@@ -115,28 +116,75 @@
|
|
int i;
|
|
// mslogon support 2 end
|
|
|
|
+// begin runge/x11vnc
|
|
+boolean disableSSL;
|
|
+boolean GET;
|
|
+String CONNECT;
|
|
+String urlPrefix;
|
|
+String httpsPort;
|
|
+String oneTimeKey;
|
|
+String serverCert;
|
|
+String ftpDropDown;
|
|
+String proxyHost;
|
|
+String proxyPort;
|
|
+boolean forceProxy;
|
|
+boolean ignoreProxy;
|
|
+boolean trustAllVncCerts;
|
|
+boolean trustUrlVncCert;
|
|
+boolean debugCerts;
|
|
+boolean debugKeyboard;
|
|
+boolean mapF5_to_atsign;
|
|
+boolean forbid_Ctrl_Alt;
|
|
+
|
|
+boolean ignoreMSLogonCheck;
|
|
+boolean delayAuthPanel;
|
|
+boolean ftpOnly;
|
|
+boolean graftFtp;
|
|
+boolean dsmActive;
|
|
+
|
|
+boolean gotAuth;
|
|
+int authGot;
|
|
+// end runge/x11vnc
|
|
+
|
|
+
|
|
//
|
|
// init()
|
|
//
|
|
|
|
+public void ftp_init() {
|
|
+ boolean show = false;
|
|
+ if (ftp != null) {
|
|
+ show = true;
|
|
+ }
|
|
+ ftp = null;
|
|
+
|
|
+ ftp = new FTPFrame(this); // KMC: FTPFrame creation
|
|
+
|
|
+ if (show) {
|
|
+ ftp.doOpen();
|
|
+ rfb.readServerDriveList();
|
|
+ }
|
|
+}
|
|
+
|
|
public void init() {
|
|
|
|
readParameters();
|
|
|
|
if (inSeparateFrame) {
|
|
- vncFrame = new Frame("Ultr@VNC");
|
|
- if (!inAnApplet) {
|
|
- vncFrame.add("Center", this);
|
|
- }
|
|
- vncContainer = vncFrame;
|
|
+ vncFrame = new Frame("Ultr@VNC");
|
|
+ if (!inAnApplet) {
|
|
+ vncFrame.add("Center", this);
|
|
+ }
|
|
+ vncContainer = vncFrame;
|
|
} else {
|
|
- vncContainer = this;
|
|
+ vncContainer = this;
|
|
}
|
|
|
|
recordingSync = new Object();
|
|
|
|
options = new OptionsFrame(this);
|
|
clipboard = new ClipboardFrame(this);
|
|
+
|
|
// authenticator = new AuthPanel(false); // mslogon support : go to connectAndAuthenticate()
|
|
if (RecordingFrame.checkSecurity())
|
|
rec = new RecordingFrame(this);
|
|
@@ -147,10 +195,11 @@
|
|
cursorUpdatesDef = null;
|
|
eightBitColorsDef = null;
|
|
|
|
- if (inSeparateFrame)
|
|
+ if (inSeparateFrame && vncFrame != null)
|
|
vncFrame.addWindowListener(this);
|
|
|
|
- ftp = new FTPFrame(this); // KMC: FTPFrame creation
|
|
+ ftp_init();
|
|
+
|
|
rfbThread = new Thread(this);
|
|
rfbThread.start();
|
|
}
|
|
@@ -186,6 +235,30 @@
|
|
gbc.weightx = 1.0;
|
|
gbc.weighty = 1.0;
|
|
|
|
+ if (ftpOnly) {
|
|
+ if (showControls) {
|
|
+ buttonPanel.enableButtons();
|
|
+ }
|
|
+ ActionListener taskPerformer = new ActionListener() {
|
|
+ public void actionPerformed(ActionEvent evt) {
|
|
+ vncFrame.setVisible(false);
|
|
+ ftp.setSavedLocations();
|
|
+ if (ftp.isVisible()) {
|
|
+ ftp.doClose();
|
|
+ } else {
|
|
+ ftp.doOpen();
|
|
+ }
|
|
+ rfb.readServerDriveList();
|
|
+ }
|
|
+ };
|
|
+ Timer t = new Timer(300, taskPerformer);
|
|
+ t.setRepeats(false);
|
|
+ t.start();
|
|
+
|
|
+ vc.processNormalProtocol();
|
|
+ return;
|
|
+ }
|
|
+
|
|
// Add ScrollPanel to applet mode
|
|
|
|
// Create a panel which itself is resizeable and can hold
|
|
@@ -286,6 +359,24 @@
|
|
|
|
void connectAndAuthenticate() throws Exception {
|
|
|
|
+ if (graftFtp) {
|
|
+ rfb = new RfbProto(host, port, this);
|
|
+ rfb.desktopName = "ftponly";
|
|
+ rfb.framebufferWidth = 12;
|
|
+ rfb.framebufferHeight = 12;
|
|
+ rfb.bitsPerPixel = 32;
|
|
+ rfb.depth = 24;
|
|
+ rfb.trueColour = true;
|
|
+ rfb.redMax = 255;
|
|
+ rfb.greenMax = 255;
|
|
+ rfb.blueMax = 255;
|
|
+ rfb.redShift = 16;
|
|
+ rfb.greenShift = 8;
|
|
+ rfb.blueShift = 0;
|
|
+ rfb.inNormalProtocol = true;
|
|
+ return;
|
|
+ }
|
|
+
|
|
// If "ENCPASSWORD" parameter is set, decrypt the password into
|
|
// the passwordParam string.
|
|
|
|
@@ -336,7 +427,22 @@
|
|
//
|
|
|
|
|
|
- prologueDetectAuthProtocol() ;
|
|
+// begin runge/x11vnc
|
|
+ gotAuth = false;
|
|
+ if (delayAuthPanel) {
|
|
+ if (tryAuthenticate(null, null)) {
|
|
+ if (inSeparateFrame) {
|
|
+ vncFrame.pack();
|
|
+ vncFrame.show();
|
|
+ }
|
|
+ return;
|
|
+ }
|
|
+ }
|
|
+// prologueDetectAuthProtocol() ;
|
|
+ if (ignoreMSLogonCheck == false) {
|
|
+ prologueDetectAuthProtocol() ;
|
|
+ }
|
|
+// end runge/x11vnc
|
|
|
|
authenticator = new AuthPanel(mslogon);
|
|
|
|
@@ -371,6 +477,7 @@
|
|
//mslogon support end
|
|
}
|
|
|
|
+ int tries = 0;
|
|
while (true) {
|
|
// Wait for user entering a password, or a username and a password
|
|
synchronized(authenticator) {
|
|
@@ -390,6 +497,13 @@
|
|
break;
|
|
//mslogon support end
|
|
|
|
+// begin runge/x11vnc
|
|
+ gotAuth = false;
|
|
+ if (++tries > 2) {
|
|
+ throw new Exception("Incorrect password entered " + tries + " times.");
|
|
+ }
|
|
+// end runge/x11vnc
|
|
+
|
|
// Retry on authentication failure.
|
|
authenticator.retry();
|
|
}
|
|
@@ -405,9 +519,11 @@
|
|
|
|
void prologueDetectAuthProtocol() throws Exception {
|
|
|
|
- rfb = new RfbProto(host, port, this);
|
|
+ if (!gotAuth) {
|
|
+ rfb = new RfbProto(host, port, this);
|
|
|
|
- rfb.readVersionMsg();
|
|
+ rfb.readVersionMsg();
|
|
+ }
|
|
|
|
System.out.println("RFB server supports protocol version " +
|
|
rfb.serverMajor + "." + rfb.serverMinor);
|
|
@@ -431,16 +547,36 @@
|
|
|
|
boolean tryAuthenticate(String us, String pw) throws Exception {
|
|
|
|
- rfb = new RfbProto(host, port, this);
|
|
+ int authScheme;
|
|
|
|
- rfb.readVersionMsg();
|
|
+ if (!gotAuth) {
|
|
+ rfb = new RfbProto(host, port, this);
|
|
|
|
- System.out.println("RFB server supports protocol version " +
|
|
- rfb.serverMajor + "." + rfb.serverMinor);
|
|
+ rfb.readVersionMsg();
|
|
|
|
- rfb.writeVersionMsg();
|
|
+ System.out.println("RFB server supports protocol version: " +
|
|
+ rfb.serverMajor + "." + rfb.serverMinor);
|
|
|
|
- int authScheme = rfb.readAuthScheme();
|
|
+ rfb.writeVersionMsg();
|
|
+
|
|
+ authScheme = rfb.readAuthScheme();
|
|
+
|
|
+ gotAuth = true;
|
|
+ authGot = authScheme;
|
|
+ } else {
|
|
+ authScheme = authGot;
|
|
+ }
|
|
+// begin runge/x11vnc
|
|
+ if (delayAuthPanel && pw == null) {
|
|
+ if (authScheme == RfbProto.NoAuth) {
|
|
+ System.out.println("No authentication needed");
|
|
+ return true;
|
|
+ } else {
|
|
+ return false;
|
|
+ }
|
|
+ }
|
|
+System.out.println("as: " + authScheme);
|
|
+// end runge/x11vnc
|
|
|
|
switch (authScheme) {
|
|
|
|
@@ -629,6 +765,10 @@
|
|
|
|
void doProtocolInitialisation() throws IOException {
|
|
|
|
+ if (graftFtp) {
|
|
+ return;
|
|
+ }
|
|
+
|
|
rfb.writeClientInit();
|
|
|
|
rfb.readServerInit();
|
|
@@ -774,9 +914,28 @@
|
|
fatalError("HOST parameter not specified");
|
|
}
|
|
}
|
|
+ Date d = new Date();
|
|
+ System.out.println("-\nSSL VNC Java Applet starting. " + d);
|
|
|
|
- String str = readParameter("PORT", true);
|
|
- port = Integer.parseInt(str);
|
|
+ port = 0;
|
|
+ String str = readParameter("PORT", false);
|
|
+ if (str != null) {
|
|
+ port = Integer.parseInt(str);
|
|
+ }
|
|
+ // When there is a proxy VNCSERVERPORT may be inaccessible (inside firewall).
|
|
+ vncserverport = 0;
|
|
+ str = readParameter("VNCSERVERPORT", false);
|
|
+ if (str != null) {
|
|
+ vncserverport = Integer.parseInt(str);
|
|
+ }
|
|
+ if (port == 0 && vncserverport == 0) {
|
|
+ fatalError("Neither PORT nor VNCSERVERPORT parameters specified");
|
|
+ }
|
|
+ if (port == 0) {
|
|
+ // Nevertheless, fall back to vncserverport if we have to.
|
|
+ System.out.println("using vncserverport: '" + vncserverport + "' for PORT.");
|
|
+ port = vncserverport;
|
|
+ }
|
|
|
|
if (inAnApplet) {
|
|
str = readParameter("Open New Window", false);
|
|
@@ -804,6 +963,158 @@
|
|
deferScreenUpdates = readIntParameter("Defer screen updates", 20);
|
|
deferCursorUpdates = readIntParameter("Defer cursor updates", 10);
|
|
deferUpdateRequests = readIntParameter("Defer update requests", 50);
|
|
+
|
|
+// begin runge/x11vnc
|
|
+ // SSL
|
|
+ disableSSL = false;
|
|
+ str = readParameter("DisableSSL", false);
|
|
+ if (str != null && str.equalsIgnoreCase("Yes"))
|
|
+ disableSSL = true;
|
|
+
|
|
+ httpsPort = readParameter("httpsPort", false);
|
|
+
|
|
+ // Extra GET, CONNECT string:
|
|
+ CONNECT = readParameter("CONNECT", false);
|
|
+ if (CONNECT != null) {
|
|
+ CONNECT = CONNECT.replaceAll(" ", ":");
|
|
+ }
|
|
+
|
|
+ GET = false;
|
|
+ str = readParameter("GET", false);
|
|
+ if (str != null && str.equalsIgnoreCase("Yes")) {
|
|
+ GET = true;
|
|
+ }
|
|
+ if (str != null && str.equalsIgnoreCase("1")) {
|
|
+ GET = true;
|
|
+ }
|
|
+
|
|
+ urlPrefix = readParameter("urlPrefix", false);
|
|
+ if (urlPrefix != null) {
|
|
+ urlPrefix = urlPrefix.replaceAll("%2F", "/");
|
|
+ urlPrefix = urlPrefix.replaceAll("%2f", "/");
|
|
+ urlPrefix = urlPrefix.replaceAll("_2F_", "/");
|
|
+ if (urlPrefix.indexOf("/") != 0) {
|
|
+ urlPrefix = "/" + urlPrefix;
|
|
+ }
|
|
+ } else {
|
|
+ urlPrefix = "";
|
|
+ }
|
|
+ System.out.println("urlPrefix: '" + urlPrefix + "'");
|
|
+
|
|
+ ftpDropDown = readParameter("ftpDropDown", false);
|
|
+ if (ftpDropDown != null) {
|
|
+ ftpDropDown = ftpDropDown.replaceAll("%2F", "/");
|
|
+ ftpDropDown = ftpDropDown.replaceAll("%2f", "/");
|
|
+ ftpDropDown = ftpDropDown.replaceAll("_2F_", "/");
|
|
+ ftpDropDown = ftpDropDown.replaceAll("%20", " ");
|
|
+ System.out.println("ftpDropDown: '" + ftpDropDown + "'");
|
|
+ }
|
|
+
|
|
+
|
|
+ oneTimeKey = readParameter("oneTimeKey", false);
|
|
+ if (oneTimeKey != null) {
|
|
+ System.out.println("oneTimeKey is set.");
|
|
+ }
|
|
+
|
|
+ serverCert = readParameter("serverCert", false);
|
|
+ if (serverCert != null) {
|
|
+ System.out.println("serverCert is set.");
|
|
+ }
|
|
+
|
|
+ forceProxy = false;
|
|
+ proxyHost = null;
|
|
+ proxyPort = null;
|
|
+ str = readParameter("forceProxy", false);
|
|
+ if (str != null) {
|
|
+ if (str.equalsIgnoreCase("Yes")) {
|
|
+ forceProxy = true;
|
|
+ } else if (str.equalsIgnoreCase("No")) {
|
|
+ forceProxy = false;
|
|
+ } else {
|
|
+ forceProxy = true;
|
|
+ String[] pieces = str.split(" ");
|
|
+ proxyHost = new String(pieces[0]);
|
|
+ if (pieces.length >= 2) {
|
|
+ proxyPort = new String(pieces[1]);
|
|
+ } else {
|
|
+ proxyPort = new String("8080");
|
|
+ }
|
|
+ }
|
|
+ }
|
|
+ str = readParameter("proxyHost", false);
|
|
+ if (str != null) {
|
|
+ proxyHost = new String(str);
|
|
+ }
|
|
+ str = readParameter("proxyPort", false);
|
|
+ if (str != null) {
|
|
+ proxyPort = new String(str);
|
|
+ }
|
|
+ if (proxyHost != null && proxyPort == null) {
|
|
+ proxyPort = new String("8080");
|
|
+ }
|
|
+
|
|
+ ignoreProxy = false;
|
|
+ str = readParameter("ignoreProxy", false);
|
|
+ if (str != null && str.equalsIgnoreCase("Yes")) {
|
|
+ ignoreProxy = true;
|
|
+ }
|
|
+
|
|
+ trustAllVncCerts = false;
|
|
+ str = readParameter("trustAllVncCerts", false);
|
|
+ if (str != null && str.equalsIgnoreCase("Yes")) {
|
|
+ trustAllVncCerts = true;
|
|
+ }
|
|
+ trustUrlVncCert = false;
|
|
+ str = readParameter("trustUrlVncCert", false);
|
|
+ if (str != null && str.equalsIgnoreCase("Yes")) {
|
|
+ trustUrlVncCert = true;
|
|
+ }
|
|
+ debugCerts = false;
|
|
+ str = readParameter("debugCerts", false);
|
|
+ if (str != null && str.equalsIgnoreCase("Yes")) {
|
|
+ debugCerts = true;
|
|
+ }
|
|
+ debugKeyboard = false;
|
|
+ str = readParameter("debugKeyboard", false);
|
|
+ if (str != null && str.equalsIgnoreCase("Yes")) {
|
|
+ debugKeyboard = true;
|
|
+ }
|
|
+ mapF5_to_atsign = false;
|
|
+ str = readParameter("mapF5_to_atsign", false);
|
|
+ if (str != null && str.equalsIgnoreCase("Yes")) {
|
|
+ mapF5_to_atsign = true;
|
|
+ }
|
|
+ forbid_Ctrl_Alt = false;
|
|
+ str = readParameter("forbid_Ctrl_Alt", false);
|
|
+ if (str != null && str.equalsIgnoreCase("Yes")) {
|
|
+ forbid_Ctrl_Alt = true;
|
|
+ }
|
|
+ ignoreMSLogonCheck = false;
|
|
+ str = readParameter("ignoreMSLogonCheck", false);
|
|
+ if (str != null && str.equalsIgnoreCase("Yes")) {
|
|
+ ignoreMSLogonCheck = true;
|
|
+ }
|
|
+ ftpOnly = false;
|
|
+ str = readParameter("ftpOnly", false);
|
|
+ if (str != null && str.equalsIgnoreCase("Yes")) {
|
|
+ ftpOnly = true;
|
|
+ }
|
|
+ graftFtp = false;
|
|
+ str = readParameter("graftFtp", false);
|
|
+ if (str != null && str.equalsIgnoreCase("Yes")) {
|
|
+ graftFtp = true;
|
|
+ }
|
|
+ dsmActive = false;
|
|
+ str = readParameter("dsmActive", false);
|
|
+ if (str != null && str.equalsIgnoreCase("Yes")) {
|
|
+ dsmActive = true;
|
|
+ }
|
|
+ delayAuthPanel = false;
|
|
+ str = readParameter("delayAuthPanel", false);
|
|
+ if (str != null && str.equalsIgnoreCase("Yes")) {
|
|
+ delayAuthPanel = true;
|
|
+ }
|
|
+// end runge/x11vnc
|
|
}
|
|
|
|
public String readParameter(String name, boolean required) {
|