summaryrefslogtreecommitdiffstats
path: root/x11vnc/remote.c
diff options
context:
space:
mode:
authorrunge <runge>2006-03-28 05:43:04 +0000
committerrunge <runge>2006-03-28 05:43:04 +0000
commit5920dc18d75a53690ed8690867f501c51595daf1 (patch)
tree4f2eb03ac80b27ba03dedaa1a4b32640703b3d02 /x11vnc/remote.c
parent10c61b53c275f125432fa20d8348aafcfed2bf93 (diff)
downloadlibtdevnc-5920dc18d75a53690ed8690867f501c51595daf1.tar.gz
libtdevnc-5920dc18d75a53690ed8690867f501c51595daf1.zip
SSL patch for Java viewer. https support for x11vnc.
Diffstat (limited to 'x11vnc/remote.c')
-rw-r--r--x11vnc/remote.c57
1 files changed, 47 insertions, 10 deletions
diff --git a/x11vnc/remote.c b/x11vnc/remote.c
index 1b4528b..4080554 100644
--- a/x11vnc/remote.c
+++ b/x11vnc/remote.c
@@ -310,6 +310,8 @@ int check_httpdir(void) {
* /path/to/bin/x11vnc
* /path/to/bin/../share/x11vnc/classes
* 12345678901234567
+ * /path/to/bin/../share/x11vnc/classes/ssl
+ * 123456789012345678901
*/
if ((q = strrchr(prog, '/')) == NULL) {
rfbLog("check_httpdir: bad program path: %s\n", prog);
@@ -317,10 +319,14 @@ int check_httpdir(void) {
return 0;
}
- len = strlen(prog) + 17 + 1;
+ len = strlen(prog) + 21 + 1;
*q = '\0';
httpdir = (char *) malloc(len);
- snprintf(httpdir, len, "%s/../share/x11vnc/classes", prog);
+ if (use_openssl || use_stunnel) {
+ snprintf(httpdir, len, "%s/../share/x11vnc/classes/ssl", prog);
+ } else {
+ snprintf(httpdir, len, "%s/../share/x11vnc/classes", prog);
+ }
free(prog);
if (stat(httpdir, &sbuf) == 0) {
@@ -331,16 +337,32 @@ int check_httpdir(void) {
return 1;
} else {
/* try some hardwires: */
- if (stat("/usr/local/share/x11vnc/classes",
- &sbuf) == 0) {
- http_dir =
- strdup("/usr/local/share/x11vnc/classes");
- return 1;
+ int i;
+ char **use;
+ char *list[] = {
+ "/usr/local/share/x11vnc/classes",
+ "/usr/share/x11vnc/classes",
+ NULL
+ };
+ char *ssllist[] = {
+ "/usr/local/share/x11vnc/classes/ssl",
+ "/usr/share/x11vnc/classes/ssl",
+ NULL
+ };
+ if (use_openssl || use_stunnel) {
+ use = ssllist;
+ } else {
+ use = list;
}
- if (stat("/usr/share/x11vnc/classes", &sbuf) == 0) {
- http_dir = strdup("/usr/share/x11vnc/classes");
- return 1;
+ i = 0;
+ while (use[i] != NULL) {
+ if (stat(use[i], &sbuf) == 0) {
+ http_dir = strdup(use[i]);
+ return 1;
+ }
+ i++;
}
+
rfbLog("check_httpdir: bad guess:\n");
rfbLog(" %s\n", httpdir);
return 0;
@@ -354,6 +376,19 @@ void http_connections(int on) {
}
if (on) {
rfbLog("http_connections: turning on http service.\n");
+
+ if (inetd && use_openssl) {
+ /*
+ * try to work around rapid fire https requests
+ * in inetd mode... ugh.
+ */
+ if (screen->httpPort == 0) {
+ int port = find_free_port(5800, 5850);
+ if (port) {
+ screen->httpPort = port;
+ }
+ }
+ }
screen->httpInitDone = FALSE;
screen->httpDir = http_dir;
if (check_httpdir()) {
@@ -3785,6 +3820,8 @@ char *process_remote_cmd(char *cmd, int stringonly) {
snprintf(buf, bufn, "aro=%s:%d", p, use_stunnel);
} else if (!strcmp(p, "stunnel_pem")) {
snprintf(buf, bufn, "aro=%s:%s", p, NONUL(stunnel_pem));
+ } else if (!strcmp(p, "https")) {
+ snprintf(buf, bufn, "aro=%s:%d", p, https_port_num);
} else if (!strcmp(p, "usepw")) {
snprintf(buf, bufn, "aro=%s:%d", p, usepw);
} else if (!strcmp(p, "using_shm")) {