Coverage Report

Created: 2024-05-20 06:11

/src/FreeRDP/libfreerdp/core/peer.c
Line
Count
Source (jump to first uncovered line)
1
/**
2
 * FreeRDP: A Remote Desktop Protocol Implementation
3
 * RDP Server Peer
4
 *
5
 * Copyright 2011 Vic Lee
6
 * Copyright 2014 DI (FH) Martin Haimberger <martin.haimberger@thincast.com>
7
 * Copyright 2023 Armin Novak <anovak@thincast.com>
8
 * Copyright 2023 Thincast Technologies GmbH
9
 *
10
 * Licensed under the Apache License, Version 2.0 (the "License");
11
 * you may not use this file except in compliance with the License.
12
 * You may obtain a copy of the License at
13
 *
14
 *     http://www.apache.org/licenses/LICENSE-2.0
15
 *
16
 * Unless required by applicable law or agreed to in writing, software
17
 * distributed under the License is distributed on an "AS IS" BASIS,
18
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
19
 * See the License for the specific language governing permissions and
20
 * limitations under the License.
21
 */
22
23
#include <freerdp/config.h>
24
25
#include "settings.h"
26
27
#include <winpr/assert.h>
28
#include <winpr/crt.h>
29
#include <winpr/winsock.h>
30
31
#include "info.h"
32
#include "display.h"
33
34
#include <freerdp/log.h>
35
#include <freerdp/streamdump.h>
36
#include <freerdp/redirection.h>
37
#include <freerdp/crypto/certificate.h>
38
39
#include "rdp.h"
40
#include "peer.h"
41
#include "multitransport.h"
42
43
6.97k
#define TAG FREERDP_TAG("core.peer")
44
45
static state_run_t peer_recv_pdu(freerdp_peer* client, wStream* s);
46
47
static HANDLE freerdp_peer_virtual_channel_open(freerdp_peer* client, const char* name,
48
                                                UINT32 flags)
49
0
{
50
0
  UINT32 index = 0;
51
0
  BOOL joined = FALSE;
52
0
  rdpMcsChannel* mcsChannel = NULL;
53
0
  rdpPeerChannel* peerChannel = NULL;
54
0
  rdpMcs* mcs = NULL;
55
56
0
  WINPR_ASSERT(client);
57
0
  WINPR_ASSERT(client->context);
58
0
  WINPR_ASSERT(client->context->rdp);
59
0
  WINPR_ASSERT(name);
60
0
  mcs = client->context->rdp->mcs;
61
0
  WINPR_ASSERT(mcs);
62
63
0
  if (flags & WTS_CHANNEL_OPTION_DYNAMIC)
64
0
    return NULL; /* not yet supported */
65
66
0
  const size_t length = strnlen(name, 9);
67
68
0
  if (length > 8)
69
0
    return NULL; /* SVC maximum name length is 8 */
70
71
0
  for (; index < mcs->channelCount; index++)
72
0
  {
73
0
    mcsChannel = &(mcs->channels[index]);
74
75
0
    if (!mcsChannel->joined)
76
0
      continue;
77
78
0
    if (_strnicmp(name, mcsChannel->Name, length) == 0)
79
0
    {
80
0
      joined = TRUE;
81
0
      break;
82
0
    }
83
0
  }
84
85
0
  if (!joined)
86
0
    return NULL; /* channel is not joined */
87
88
0
  peerChannel = (rdpPeerChannel*)mcsChannel->handle;
89
90
0
  if (peerChannel)
91
0
  {
92
    /* channel is already open */
93
0
    return (HANDLE)peerChannel;
94
0
  }
95
96
0
  peerChannel = server_channel_common_new(client, index, mcsChannel->ChannelId, 128, NULL, name);
97
98
0
  if (peerChannel)
99
0
  {
100
0
    peerChannel->channelFlags = flags;
101
0
    peerChannel->mcsChannel = mcsChannel;
102
0
    mcsChannel->handle = (void*)peerChannel;
103
0
  }
104
105
0
  return (HANDLE)peerChannel;
106
0
}
107
108
static BOOL freerdp_peer_virtual_channel_close(freerdp_peer* client, HANDLE hChannel)
109
0
{
110
0
  rdpMcsChannel* mcsChannel = NULL;
111
0
  rdpPeerChannel* peerChannel = NULL;
112
113
0
  WINPR_ASSERT(client);
114
115
0
  if (!hChannel)
116
0
    return FALSE;
117
118
0
  peerChannel = (rdpPeerChannel*)hChannel;
119
0
  mcsChannel = peerChannel->mcsChannel;
120
0
  WINPR_ASSERT(mcsChannel);
121
0
  mcsChannel->handle = NULL;
122
0
  server_channel_common_free(peerChannel);
123
0
  return TRUE;
124
0
}
125
126
static int freerdp_peer_virtual_channel_write(freerdp_peer* client, HANDLE hChannel,
127
                                              const BYTE* buffer, UINT32 length)
128
0
{
129
0
  wStream* s = NULL;
130
0
  UINT32 flags = 0;
131
0
  UINT32 chunkSize = 0;
132
0
  UINT32 maxChunkSize = 0;
133
0
  UINT32 totalLength = 0;
134
0
  rdpPeerChannel* peerChannel = NULL;
135
0
  rdpMcsChannel* mcsChannel = NULL;
136
0
  rdpRdp* rdp = NULL;
137
138
0
  WINPR_ASSERT(client);
139
0
  WINPR_ASSERT(client->context);
140
141
0
  rdp = client->context->rdp;
142
0
  WINPR_ASSERT(rdp);
143
0
  WINPR_ASSERT(rdp->settings);
144
145
0
  if (!hChannel)
146
0
    return -1;
147
148
0
  peerChannel = (rdpPeerChannel*)hChannel;
149
0
  mcsChannel = peerChannel->mcsChannel;
150
0
  WINPR_ASSERT(peerChannel);
151
0
  WINPR_ASSERT(mcsChannel);
152
0
  if (peerChannel->channelFlags & WTS_CHANNEL_OPTION_DYNAMIC)
153
0
    return -1; /* not yet supported */
154
155
0
  maxChunkSize = rdp->settings->VCChunkSize;
156
0
  totalLength = length;
157
0
  flags = CHANNEL_FLAG_FIRST;
158
159
0
  while (length > 0)
160
0
  {
161
0
    s = rdp_send_stream_init(rdp);
162
163
0
    if (!s)
164
0
      return -1;
165
166
0
    if (length > maxChunkSize)
167
0
    {
168
0
      chunkSize = rdp->settings->VCChunkSize;
169
0
    }
170
0
    else
171
0
    {
172
0
      chunkSize = length;
173
0
      flags |= CHANNEL_FLAG_LAST;
174
0
    }
175
176
0
    if (mcsChannel->options & CHANNEL_OPTION_SHOW_PROTOCOL)
177
0
      flags |= CHANNEL_FLAG_SHOW_PROTOCOL;
178
179
0
    Stream_Write_UINT32(s, totalLength);
180
0
    Stream_Write_UINT32(s, flags);
181
182
0
    if (!Stream_EnsureRemainingCapacity(s, chunkSize))
183
0
    {
184
0
      Stream_Release(s);
185
0
      return -1;
186
0
    }
187
188
0
    Stream_Write(s, buffer, chunkSize);
189
190
0
    if (!rdp_send(rdp, s, peerChannel->channelId))
191
0
      return -1;
192
193
0
    buffer += chunkSize;
194
0
    length -= chunkSize;
195
0
    flags = 0;
196
0
  }
197
198
0
  return 1;
199
0
}
200
201
static void* freerdp_peer_virtual_channel_get_data(freerdp_peer* client, HANDLE hChannel)
202
0
{
203
0
  rdpPeerChannel* peerChannel = (rdpPeerChannel*)hChannel;
204
205
0
  WINPR_ASSERT(client);
206
0
  if (!hChannel)
207
0
    return NULL;
208
209
0
  return peerChannel->extra;
210
0
}
211
212
static int freerdp_peer_virtual_channel_set_data(freerdp_peer* client, HANDLE hChannel, void* data)
213
0
{
214
0
  rdpPeerChannel* peerChannel = (rdpPeerChannel*)hChannel;
215
216
0
  WINPR_ASSERT(client);
217
0
  if (!hChannel)
218
0
    return -1;
219
220
0
  peerChannel->extra = data;
221
0
  return 1;
222
0
}
223
224
static BOOL freerdp_peer_set_state(freerdp_peer* client, CONNECTION_STATE state)
225
0
{
226
0
  WINPR_ASSERT(client);
227
0
  WINPR_ASSERT(client->context);
228
0
  return rdp_server_transition_to_state(client->context->rdp, state);
229
0
}
230
231
static BOOL freerdp_peer_initialize(freerdp_peer* client)
232
0
{
233
0
  rdpRdp* rdp = NULL;
234
0
  rdpSettings* settings = NULL;
235
236
0
  WINPR_ASSERT(client);
237
0
  WINPR_ASSERT(client->context);
238
239
0
  rdp = client->context->rdp;
240
0
  WINPR_ASSERT(rdp);
241
242
0
  settings = rdp->settings;
243
0
  WINPR_ASSERT(settings);
244
245
0
  settings->ServerMode = TRUE;
246
0
  settings->FrameAcknowledge = 0;
247
0
  settings->LocalConnection = client->local;
248
249
0
  const rdpCertificate* cert =
250
0
      freerdp_settings_get_pointer(settings, FreeRDP_RdpServerCertificate);
251
0
  if (!cert)
252
0
  {
253
0
    WLog_ERR(TAG, "Missing server certificate, can not continue.");
254
0
    return FALSE;
255
0
  }
256
257
0
  if (freerdp_settings_get_bool(settings, FreeRDP_RdpSecurity))
258
0
  {
259
260
0
    if (!freerdp_certificate_is_rdp_security_compatible(cert))
261
0
    {
262
0
      if (!freerdp_settings_set_bool(settings, FreeRDP_RdpSecurity, FALSE))
263
0
        return FALSE;
264
0
      if (!freerdp_settings_set_bool(settings, FreeRDP_UseRdpSecurityLayer, FALSE))
265
0
        return FALSE;
266
0
    }
267
0
  }
268
269
0
  nego_set_RCG_supported(rdp->nego, settings->RemoteCredentialGuard);
270
0
  if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_INITIAL))
271
0
    return FALSE;
272
273
0
  return TRUE;
274
0
}
275
276
#if defined(WITH_FREERDP_DEPRECATED)
277
static BOOL freerdp_peer_get_fds(freerdp_peer* client, void** rfds, int* rcount)
278
{
279
  rdpTransport* transport = NULL;
280
  WINPR_ASSERT(client);
281
  WINPR_ASSERT(client->context);
282
  WINPR_ASSERT(client->context->rdp);
283
284
  transport = client->context->rdp->transport;
285
  WINPR_ASSERT(transport);
286
  transport_get_fds(transport, rfds, rcount);
287
  return TRUE;
288
}
289
#endif
290
291
static HANDLE freerdp_peer_get_event_handle(freerdp_peer* client)
292
0
{
293
0
  HANDLE hEvent = NULL;
294
0
  rdpTransport* transport = NULL;
295
0
  WINPR_ASSERT(client);
296
0
  WINPR_ASSERT(client->context);
297
0
  WINPR_ASSERT(client->context->rdp);
298
299
0
  transport = client->context->rdp->transport;
300
0
  hEvent = transport_get_front_bio(transport);
301
0
  return hEvent;
302
0
}
303
304
static DWORD freerdp_peer_get_event_handles(freerdp_peer* client, HANDLE* events, DWORD count)
305
0
{
306
0
  WINPR_ASSERT(client);
307
0
  WINPR_ASSERT(client->context);
308
0
  WINPR_ASSERT(client->context->rdp);
309
0
  return transport_get_event_handles(client->context->rdp->transport, events, count);
310
0
}
311
312
static BOOL freerdp_peer_check_fds(freerdp_peer* peer)
313
0
{
314
0
  int status = 0;
315
0
  rdpRdp* rdp = NULL;
316
317
0
  WINPR_ASSERT(peer);
318
0
  WINPR_ASSERT(peer->context);
319
320
0
  rdp = peer->context->rdp;
321
0
  status = rdp_check_fds(rdp);
322
323
0
  if (status < 0)
324
0
    return FALSE;
325
326
0
  return TRUE;
327
0
}
328
329
static state_run_t peer_recv_data_pdu(freerdp_peer* client, wStream* s, UINT16 totalLength)
330
0
{
331
0
  BYTE type = 0;
332
0
  UINT16 length = 0;
333
0
  UINT32 share_id = 0;
334
0
  BYTE compressed_type = 0;
335
0
  UINT16 compressed_len = 0;
336
0
  rdpUpdate* update = NULL;
337
338
0
  WINPR_ASSERT(s);
339
0
  WINPR_ASSERT(client);
340
0
  WINPR_ASSERT(client->context);
341
0
  rdpRdp* rdp = client->context->rdp;
342
0
  WINPR_ASSERT(rdp);
343
0
  WINPR_ASSERT(rdp->mcs);
344
345
0
  update = client->context->update;
346
0
  WINPR_ASSERT(update);
347
348
0
  if (!rdp_read_share_data_header(rdp, s, &length, &type, &share_id, &compressed_type,
349
0
                                  &compressed_len))
350
0
    return STATE_RUN_FAILED;
351
352
#ifdef WITH_DEBUG_RDP
353
  WLog_Print(rdp->log, WLOG_DEBUG, "recv %s Data PDU (0x%02" PRIX8 "), length: %" PRIu16 "",
354
             data_pdu_type_to_string(type), type, length);
355
#endif
356
357
0
  switch (type)
358
0
  {
359
0
    case DATA_PDU_TYPE_SYNCHRONIZE:
360
0
      if (!rdp_recv_client_synchronize_pdu(rdp, s))
361
0
        return STATE_RUN_FAILED;
362
363
0
      break;
364
365
0
    case DATA_PDU_TYPE_CONTROL:
366
0
      if (!rdp_server_accept_client_control_pdu(rdp, s))
367
0
        return STATE_RUN_FAILED;
368
369
0
      break;
370
371
0
    case DATA_PDU_TYPE_INPUT:
372
0
      if (!input_recv(rdp->input, s))
373
0
        return STATE_RUN_FAILED;
374
375
0
      break;
376
377
0
    case DATA_PDU_TYPE_BITMAP_CACHE_PERSISTENT_LIST:
378
0
      if (!rdp_server_accept_client_persistent_key_list_pdu(rdp, s))
379
0
        return STATE_RUN_FAILED;
380
0
      break;
381
382
0
    case DATA_PDU_TYPE_FONT_LIST:
383
0
      if (!rdp_server_accept_client_font_list_pdu(rdp, s))
384
0
        return STATE_RUN_FAILED;
385
386
0
      return STATE_RUN_CONTINUE; // State changed, trigger rerun
387
388
0
    case DATA_PDU_TYPE_SHUTDOWN_REQUEST:
389
0
      mcs_send_disconnect_provider_ultimatum(rdp->mcs);
390
0
      WLog_WARN(TAG, "disconnect provider ultimatum sent to peer, closing connection");
391
0
      return STATE_RUN_QUIT_SESSION;
392
393
0
    case DATA_PDU_TYPE_FRAME_ACKNOWLEDGE:
394
0
      if (!Stream_CheckAndLogRequiredLength(TAG, s, 4))
395
0
        return STATE_RUN_FAILED;
396
397
0
      Stream_Read_UINT32(s, client->ack_frame_id);
398
0
      IFCALL(update->SurfaceFrameAcknowledge, update->context, client->ack_frame_id);
399
0
      break;
400
401
0
    case DATA_PDU_TYPE_REFRESH_RECT:
402
0
      if (!update_read_refresh_rect(update, s))
403
0
        return STATE_RUN_FAILED;
404
405
0
      break;
406
407
0
    case DATA_PDU_TYPE_SUPPRESS_OUTPUT:
408
0
      if (!update_read_suppress_output(update, s))
409
0
        return STATE_RUN_FAILED;
410
411
0
      break;
412
413
0
    default:
414
0
      WLog_ERR(TAG, "Data PDU type %" PRIu8 "", type);
415
0
      break;
416
0
  }
417
418
0
  return STATE_RUN_SUCCESS;
419
0
}
420
421
static state_run_t peer_recv_tpkt_pdu(freerdp_peer* client, wStream* s)
422
0
{
423
0
  state_run_t rc = STATE_RUN_SUCCESS;
424
0
  rdpRdp* rdp = NULL;
425
0
  UINT16 length = 0;
426
0
  UINT16 pduType = 0;
427
0
  UINT16 pduSource = 0;
428
0
  UINT16 channelId = 0;
429
0
  UINT16 securityFlags = 0;
430
0
  rdpSettings* settings = NULL;
431
432
0
  WINPR_ASSERT(s);
433
0
  WINPR_ASSERT(client);
434
0
  WINPR_ASSERT(client->context);
435
436
0
  rdp = client->context->rdp;
437
0
  WINPR_ASSERT(rdp);
438
0
  WINPR_ASSERT(rdp->mcs);
439
440
0
  settings = client->context->settings;
441
0
  WINPR_ASSERT(settings);
442
443
0
  if (!rdp_read_header(rdp, s, &length, &channelId))
444
0
    return STATE_RUN_FAILED;
445
446
0
  rdp->inPackets++;
447
0
  if (freerdp_shall_disconnect_context(rdp->context))
448
0
    return STATE_RUN_SUCCESS;
449
450
0
  if (rdp_get_state(rdp) <= CONNECTION_STATE_LICENSING)
451
0
  {
452
0
    if (!rdp_read_security_header(rdp, s, &securityFlags, &length))
453
0
      return STATE_RUN_FAILED;
454
0
    if (securityFlags & SEC_ENCRYPT)
455
0
    {
456
0
      if (!rdp_decrypt(rdp, s, &length, securityFlags))
457
0
        return STATE_RUN_FAILED;
458
0
    }
459
0
    return rdp_recv_message_channel_pdu(rdp, s, securityFlags);
460
0
  }
461
462
0
  if (settings->UseRdpSecurityLayer)
463
0
  {
464
0
    if (!rdp_read_security_header(rdp, s, &securityFlags, &length))
465
0
      return STATE_RUN_FAILED;
466
467
0
    if (securityFlags & SEC_ENCRYPT)
468
0
    {
469
0
      if (!rdp_decrypt(rdp, s, &length, securityFlags))
470
0
        return STATE_RUN_FAILED;
471
0
    }
472
0
  }
473
474
0
  if (channelId == MCS_GLOBAL_CHANNEL_ID)
475
0
  {
476
0
    char buffer[256] = { 0 };
477
0
    UINT16 pduLength = 0;
478
0
    UINT16 remain = 0;
479
0
    if (!rdp_read_share_control_header(rdp, s, &pduLength, &remain, &pduType, &pduSource))
480
0
      return STATE_RUN_FAILED;
481
482
0
    settings->PduSource = pduSource;
483
484
0
    WLog_DBG(TAG, "Received %s", pdu_type_to_str(pduType, buffer, sizeof(buffer)));
485
0
    switch (pduType)
486
0
    {
487
0
      case PDU_TYPE_DATA:
488
0
        rc = peer_recv_data_pdu(client, s, pduLength);
489
0
        break;
490
491
0
      case PDU_TYPE_CONFIRM_ACTIVE:
492
0
        if (!rdp_server_accept_confirm_active(rdp, s, pduLength))
493
0
          return STATE_RUN_FAILED;
494
495
0
        break;
496
497
0
      case PDU_TYPE_FLOW_RESPONSE:
498
0
      case PDU_TYPE_FLOW_STOP:
499
0
      case PDU_TYPE_FLOW_TEST:
500
0
        if (!Stream_SafeSeek(s, remain))
501
0
        {
502
0
          WLog_WARN(TAG, "Short PDU, need %" PRIuz " bytes, got %" PRIuz, remain,
503
0
                    Stream_GetRemainingLength(s));
504
0
          return STATE_RUN_FAILED;
505
0
        }
506
0
        break;
507
508
0
      default:
509
0
        WLog_ERR(TAG, "Client sent unknown pduType %" PRIu16 "", pduType);
510
0
        return STATE_RUN_FAILED;
511
0
    }
512
0
  }
513
0
  else if ((rdp->mcs->messageChannelId > 0) && (channelId == rdp->mcs->messageChannelId))
514
0
  {
515
0
    if (!settings->UseRdpSecurityLayer)
516
0
    {
517
0
      if (!rdp_read_security_header(rdp, s, &securityFlags, NULL))
518
0
        return STATE_RUN_FAILED;
519
0
    }
520
521
0
    return rdp_recv_message_channel_pdu(rdp, s, securityFlags);
522
0
  }
523
0
  else
524
0
  {
525
0
    if (!freerdp_channel_peer_process(client, s, channelId))
526
0
      return STATE_RUN_FAILED;
527
0
  }
528
0
  if (!tpkt_ensure_stream_consumed(s, length))
529
0
    return STATE_RUN_FAILED;
530
531
0
  return rc;
532
0
}
533
534
static state_run_t peer_recv_handle_auto_detect(freerdp_peer* client, wStream* s)
535
0
{
536
0
  state_run_t ret = STATE_RUN_FAILED;
537
0
  rdpRdp* rdp = NULL;
538
539
0
  WINPR_ASSERT(client);
540
0
  WINPR_ASSERT(s);
541
0
  WINPR_ASSERT(client->context);
542
543
0
  rdp = client->context->rdp;
544
0
  WINPR_ASSERT(rdp);
545
546
0
  const rdpSettings* settings = client->context->settings;
547
0
  WINPR_ASSERT(settings);
548
549
0
  if (freerdp_settings_get_bool(settings, FreeRDP_NetworkAutoDetect))
550
0
  {
551
0
    switch (rdp_get_state(rdp))
552
0
    {
553
0
      case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_REQUEST:
554
0
        autodetect_on_connect_time_auto_detect_begin(rdp->autodetect);
555
0
        switch (autodetect_get_state(rdp->autodetect))
556
0
        {
557
0
          case FREERDP_AUTODETECT_STATE_REQUEST:
558
0
            ret = STATE_RUN_SUCCESS;
559
0
            if (!rdp_server_transition_to_state(
560
0
                    rdp, CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_RESPONSE))
561
0
              return STATE_RUN_FAILED;
562
0
            break;
563
0
          case FREERDP_AUTODETECT_STATE_COMPLETE:
564
0
            ret = STATE_RUN_CONTINUE; /* Rerun in next state */
565
0
            if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_LICENSING))
566
0
              return STATE_RUN_FAILED;
567
0
            break;
568
0
          default:
569
0
            break;
570
0
        }
571
0
        break;
572
0
      case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_RESPONSE:
573
0
        ret = peer_recv_pdu(client, s);
574
0
        if (state_run_success(ret))
575
0
        {
576
0
          autodetect_on_connect_time_auto_detect_progress(rdp->autodetect);
577
0
          switch (autodetect_get_state(rdp->autodetect))
578
0
          {
579
0
            case FREERDP_AUTODETECT_STATE_REQUEST:
580
0
              ret = STATE_RUN_SUCCESS;
581
0
              break;
582
0
            case FREERDP_AUTODETECT_STATE_COMPLETE:
583
0
              ret = STATE_RUN_CONTINUE; /* Rerun in next state */
584
0
              if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_LICENSING))
585
0
                return STATE_RUN_FAILED;
586
0
              break;
587
0
            default:
588
0
              break;
589
0
          }
590
0
        }
591
0
        break;
592
0
      default:
593
0
        WINPR_ASSERT(FALSE);
594
0
        break;
595
0
    }
596
0
  }
597
0
  else
598
0
  {
599
0
    if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_LICENSING))
600
0
      return STATE_RUN_FAILED;
601
602
0
    ret = STATE_RUN_CONTINUE; /* Rerun in next state */
603
0
  }
604
605
0
  return ret;
606
0
}
607
608
static state_run_t peer_recv_handle_licensing(freerdp_peer* client, wStream* s)
609
0
{
610
0
  state_run_t ret = STATE_RUN_FAILED;
611
0
  rdpRdp* rdp = NULL;
612
0
  rdpSettings* settings = NULL;
613
614
0
  WINPR_ASSERT(client);
615
0
  WINPR_ASSERT(s);
616
0
  WINPR_ASSERT(client->context);
617
618
0
  rdp = client->context->rdp;
619
0
  WINPR_ASSERT(rdp);
620
621
0
  settings = rdp->settings;
622
0
  WINPR_ASSERT(settings);
623
624
0
  switch (license_get_state(rdp->license))
625
0
  {
626
0
    case LICENSE_STATE_INITIAL:
627
0
    {
628
0
      const BOOL required =
629
0
          freerdp_settings_get_bool(settings, FreeRDP_ServerLicenseRequired);
630
631
0
      if (required)
632
0
      {
633
0
        if (!license_server_configure(rdp->license))
634
0
          ret = STATE_RUN_FAILED;
635
0
        else if (!license_server_send_request(rdp->license))
636
0
          ret = STATE_RUN_FAILED;
637
0
        else
638
0
          ret = STATE_RUN_SUCCESS;
639
0
      }
640
0
      else
641
0
      {
642
0
        if (license_send_valid_client_error_packet(rdp))
643
0
          ret = STATE_RUN_CONTINUE; /* Rerun in next state, might be capabilities */
644
0
      }
645
0
    }
646
0
    break;
647
0
    case LICENSE_STATE_COMPLETED:
648
0
      ret = STATE_RUN_CONTINUE; /* Licensing completed, continue in next state */
649
0
      break;
650
0
    case LICENSE_STATE_ABORTED:
651
0
      ret = STATE_RUN_FAILED;
652
0
      break;
653
0
    default:
654
0
      ret = peer_recv_pdu(client, s);
655
0
      break;
656
0
  }
657
658
0
  return ret;
659
0
}
660
661
static state_run_t peer_recv_fastpath_pdu(freerdp_peer* client, wStream* s)
662
0
{
663
0
  rdpRdp* rdp = NULL;
664
0
  UINT16 length = 0;
665
0
  BOOL rc = 0;
666
0
  rdpFastPath* fastpath = NULL;
667
668
0
  WINPR_ASSERT(s);
669
0
  WINPR_ASSERT(client);
670
0
  WINPR_ASSERT(client->context);
671
672
0
  rdp = client->context->rdp;
673
0
  WINPR_ASSERT(rdp);
674
675
0
  fastpath = rdp->fastpath;
676
0
  WINPR_ASSERT(fastpath);
677
678
0
  rc = fastpath_read_header_rdp(fastpath, s, &length);
679
680
0
  if (!rc || (length == 0))
681
0
  {
682
0
    WLog_ERR(TAG, "incorrect FastPath PDU header length %" PRIu16 "", length);
683
0
    return STATE_RUN_FAILED;
684
0
  }
685
0
  if (!Stream_CheckAndLogRequiredLength(TAG, s, length))
686
0
    return STATE_RUN_FAILED;
687
688
0
  if (!fastpath_decrypt(fastpath, s, &length))
689
0
    return STATE_RUN_FAILED;
690
691
0
  rdp->inPackets++;
692
693
0
  return fastpath_recv_inputs(fastpath, s);
694
0
}
695
696
state_run_t peer_recv_pdu(freerdp_peer* client, wStream* s)
697
0
{
698
0
  int rc = tpkt_verify_header(s);
699
700
0
  if (rc > 0)
701
0
    return peer_recv_tpkt_pdu(client, s);
702
0
  else if (rc == 0)
703
0
    return peer_recv_fastpath_pdu(client, s);
704
0
  else
705
0
    return STATE_RUN_FAILED;
706
0
}
707
708
static state_run_t peer_unexpected_client_message(rdpRdp* rdp, UINT32 flag)
709
0
{
710
0
  char buffer[1024] = { 0 };
711
0
  WLog_WARN(TAG, "Unexpected client message in state %s, missing flag %s",
712
0
            rdp_get_state_string(rdp), rdp_finalize_flags_to_str(flag, buffer, sizeof(buffer)));
713
0
  return STATE_RUN_SUCCESS; /* we ignore this as per spec input PDU are already allowed */
714
0
}
715
716
state_run_t rdp_peer_handle_state_demand_active(freerdp_peer* client)
717
0
{
718
0
  state_run_t ret = STATE_RUN_FAILED;
719
720
0
  WINPR_ASSERT(client);
721
0
  WINPR_ASSERT(client->context);
722
723
0
  rdpRdp* rdp = client->context->rdp;
724
0
  WINPR_ASSERT(rdp);
725
726
0
  if (client->Capabilities && !client->Capabilities(client))
727
0
  {
728
0
    WLog_ERR(TAG, "[%s] freerdp_peer::Capabilities() callback failed",
729
0
             rdp_get_state_string(rdp));
730
0
  }
731
0
  else if (!rdp_send_demand_active(rdp))
732
0
  {
733
0
    WLog_ERR(TAG, "[%s] rdp_send_demand_active() fail", rdp_get_state_string(rdp));
734
0
  }
735
0
  else
736
0
  {
737
0
    if (!rdp_server_transition_to_state(rdp,
738
0
                                        CONNECTION_STATE_CAPABILITIES_EXCHANGE_MONITOR_LAYOUT))
739
0
      return STATE_RUN_FAILED;
740
0
    ret = STATE_RUN_CONTINUE;
741
0
  }
742
0
  return ret;
743
0
}
744
745
/** \brief Handle server peer state ACTIVE:
746
 *  On initial run (not connected, not activated) do not read data
747
 *
748
 *  \return -1 in case of an error, 0 if no data needs to be processed, 1 to let
749
 *  the state machine run again and 2 if peer_recv_pdu must be called.
750
 */
751
static state_run_t rdp_peer_handle_state_active(freerdp_peer* client)
752
0
{
753
0
  state_run_t ret = STATE_RUN_FAILED;
754
755
0
  WINPR_ASSERT(client);
756
0
  WINPR_ASSERT(client->context);
757
758
0
  rdpRdp* rdp = client->context->rdp;
759
0
  WINPR_ASSERT(rdp);
760
761
0
  if (!client->connected)
762
0
  {
763
    /**
764
     * PostConnect should only be called once and should not
765
     * be called after a reactivation sequence.
766
     */
767
0
    IFCALLRET(client->PostConnect, client->connected, client);
768
0
  }
769
0
  if (!client->connected)
770
0
  {
771
0
    WLog_ERR(TAG, "PostConnect for peer %p failed", client);
772
0
    ret = STATE_RUN_FAILED;
773
0
  }
774
0
  else if (!client->activated)
775
0
  {
776
0
    BOOL activated = TRUE;
777
778
    /*  Set client->activated TRUE before calling the Activate callback.
779
     *  the Activate callback might reset the client->activated flag even if it returns success
780
     * (e.g. deactivate/reactivate sequence) */
781
0
    client->activated = TRUE;
782
0
    IFCALLRET(client->Activate, activated, client);
783
784
0
    if (!activated)
785
0
    {
786
0
      WLog_ERR(TAG, "Activate for peer %p failed", client);
787
0
      ret = STATE_RUN_FAILED;
788
0
    }
789
0
    else
790
0
      ret = STATE_RUN_SUCCESS;
791
0
  }
792
0
  else
793
0
    ret = STATE_RUN_ACTIVE;
794
0
  return ret;
795
0
}
796
797
static state_run_t peer_recv_callback_internal(rdpTransport* transport, wStream* s, void* extra)
798
0
{
799
0
  UINT32 SelectedProtocol = 0;
800
0
  freerdp_peer* client = (freerdp_peer*)extra;
801
0
  rdpRdp* rdp = NULL;
802
0
  state_run_t ret = STATE_RUN_FAILED;
803
0
  rdpSettings* settings = NULL;
804
805
0
  WINPR_ASSERT(transport);
806
0
  WINPR_ASSERT(client);
807
0
  WINPR_ASSERT(client->context);
808
809
0
  rdp = client->context->rdp;
810
0
  WINPR_ASSERT(rdp);
811
812
0
  settings = client->context->settings;
813
0
  WINPR_ASSERT(settings);
814
815
0
  IFCALL(client->ReachedState, client, rdp_get_state(rdp));
816
0
  switch (rdp_get_state(rdp))
817
0
  {
818
0
    case CONNECTION_STATE_INITIAL:
819
0
      if (rdp_server_transition_to_state(rdp, CONNECTION_STATE_NEGO))
820
0
        ret = STATE_RUN_CONTINUE;
821
0
      break;
822
823
0
    case CONNECTION_STATE_NEGO:
824
0
      if (!rdp_server_accept_nego(rdp, s))
825
0
      {
826
0
        WLog_ERR(TAG, "%s - rdp_server_accept_nego() fail", rdp_get_state_string(rdp));
827
0
      }
828
0
      else
829
0
      {
830
0
        SelectedProtocol = nego_get_selected_protocol(rdp->nego);
831
0
        settings->RdstlsSecurity = (SelectedProtocol & PROTOCOL_RDSTLS) ? TRUE : FALSE;
832
0
        settings->NlaSecurity = (SelectedProtocol & PROTOCOL_HYBRID) ? TRUE : FALSE;
833
0
        settings->TlsSecurity = (SelectedProtocol & PROTOCOL_SSL) ? TRUE : FALSE;
834
0
        settings->RdpSecurity = (SelectedProtocol == PROTOCOL_RDP) ? TRUE : FALSE;
835
836
0
        if (SelectedProtocol & PROTOCOL_HYBRID)
837
0
        {
838
0
          SEC_WINNT_AUTH_IDENTITY_INFO* identity =
839
0
              (SEC_WINNT_AUTH_IDENTITY_INFO*)nego_get_identity(rdp->nego);
840
0
          sspi_CopyAuthIdentity(&client->identity, identity);
841
0
          IFCALLRET(client->Logon, client->authenticated, client, &client->identity,
842
0
                    TRUE);
843
0
          nego_free_nla(rdp->nego);
844
0
        }
845
0
        else
846
0
        {
847
0
          IFCALLRET(client->Logon, client->authenticated, client, &client->identity,
848
0
                    FALSE);
849
0
        }
850
0
        if (rdp_server_transition_to_state(rdp, CONNECTION_STATE_MCS_CREATE_REQUEST))
851
0
          ret = STATE_RUN_SUCCESS;
852
0
      }
853
0
      break;
854
855
0
    case CONNECTION_STATE_NLA:
856
0
      WINPR_ASSERT(FALSE); // TODO
857
0
      break;
858
859
0
    case CONNECTION_STATE_MCS_CREATE_REQUEST:
860
0
      if (!rdp_server_accept_mcs_connect_initial(rdp, s))
861
0
      {
862
0
        WLog_ERR(TAG,
863
0
                 "%s - "
864
0
                 "rdp_server_accept_mcs_connect_initial() fail",
865
0
                 rdp_get_state_string(rdp));
866
0
      }
867
0
      else
868
0
        ret = STATE_RUN_SUCCESS;
869
870
0
      break;
871
872
0
    case CONNECTION_STATE_MCS_ERECT_DOMAIN:
873
0
      if (!rdp_server_accept_mcs_erect_domain_request(rdp, s))
874
0
      {
875
0
        WLog_ERR(TAG,
876
0
                 "%s - "
877
0
                 "rdp_server_accept_mcs_erect_domain_request() fail",
878
0
                 rdp_get_state_string(rdp));
879
0
      }
880
0
      else
881
0
        ret = STATE_RUN_SUCCESS;
882
883
0
      break;
884
885
0
    case CONNECTION_STATE_MCS_ATTACH_USER:
886
0
      if (!rdp_server_accept_mcs_attach_user_request(rdp, s))
887
0
      {
888
0
        WLog_ERR(TAG,
889
0
                 "%s - "
890
0
                 "rdp_server_accept_mcs_attach_user_request() fail",
891
0
                 rdp_get_state_string(rdp));
892
0
      }
893
0
      else
894
0
        ret = STATE_RUN_SUCCESS;
895
896
0
      break;
897
898
0
    case CONNECTION_STATE_MCS_CHANNEL_JOIN_REQUEST:
899
0
      if (!rdp_server_accept_mcs_channel_join_request(rdp, s))
900
0
      {
901
0
        WLog_ERR(TAG,
902
0
                 "%s - "
903
0
                 "rdp_server_accept_mcs_channel_join_request() fail",
904
0
                 rdp_get_state_string(rdp));
905
0
      }
906
0
      else
907
0
        ret = STATE_RUN_SUCCESS;
908
0
      break;
909
910
0
    case CONNECTION_STATE_RDP_SECURITY_COMMENCEMENT:
911
0
      ret = STATE_RUN_SUCCESS;
912
913
0
      if (!rdp_server_establish_keys(rdp, s))
914
0
      {
915
0
        WLog_ERR(TAG,
916
0
                 "%s - "
917
0
                 "rdp_server_establish_keys() fail",
918
0
                 rdp_get_state_string(rdp));
919
0
        ret = STATE_RUN_FAILED;
920
0
      }
921
922
0
      if (state_run_success(ret))
923
0
      {
924
0
        if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_SECURE_SETTINGS_EXCHANGE))
925
0
          ret = STATE_RUN_FAILED;
926
0
        else if (Stream_GetRemainingLength(s) > 0)
927
0
          ret = STATE_RUN_CONTINUE; /* Rerun function */
928
0
      }
929
0
      break;
930
931
0
    case CONNECTION_STATE_SECURE_SETTINGS_EXCHANGE:
932
0
      if (rdp_recv_client_info(rdp, s))
933
0
      {
934
0
        if (rdp_server_transition_to_state(
935
0
                rdp, CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_REQUEST))
936
0
          ret = STATE_RUN_CONTINUE;
937
0
      }
938
0
      break;
939
940
0
    case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_REQUEST:
941
0
    case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_RESPONSE:
942
0
      ret = peer_recv_handle_auto_detect(client, s);
943
0
      break;
944
945
0
    case CONNECTION_STATE_LICENSING:
946
0
      ret = peer_recv_handle_licensing(client, s);
947
0
      if (ret == STATE_RUN_CONTINUE)
948
0
      {
949
0
        if (!rdp_server_transition_to_state(
950
0
                rdp, CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_REQUEST))
951
0
          ret = STATE_RUN_FAILED;
952
0
      }
953
0
      break;
954
955
0
    case CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_REQUEST:
956
0
      if (settings->SupportMultitransport &&
957
0
          ((settings->MultitransportFlags & INITIATE_REQUEST_PROTOCOL_UDPFECR) != 0))
958
0
      {
959
        /* only UDP reliable for now, nobody does lossy UDP (MS-RDPUDP only) these days */
960
0
        ret = multitransport_server_request(rdp->multitransport,
961
0
                                            INITIATE_REQUEST_PROTOCOL_UDPFECR);
962
0
        switch (ret)
963
0
        {
964
0
          case STATE_RUN_SUCCESS:
965
0
            rdp_server_transition_to_state(
966
0
                rdp, CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_RESPONSE);
967
0
            break;
968
0
          case STATE_RUN_CONTINUE:
969
            /* mismatch on the supported kind of UDP transports */
970
0
            rdp_server_transition_to_state(
971
0
                rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE);
972
0
            break;
973
0
          default:
974
0
            break;
975
0
        }
976
0
      }
977
0
      else
978
0
      {
979
0
        if (rdp_server_transition_to_state(
980
0
                rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE))
981
0
          ret = STATE_RUN_CONTINUE; /* Rerun, initialize next state */
982
0
      }
983
0
      break;
984
0
    case CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_RESPONSE:
985
0
      ret = peer_recv_pdu(client, s);
986
0
      break;
987
988
0
    case CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE:
989
0
      ret = rdp_peer_handle_state_demand_active(client);
990
0
      break;
991
992
0
    case CONNECTION_STATE_CAPABILITIES_EXCHANGE_MONITOR_LAYOUT:
993
0
      if (freerdp_settings_get_bool(settings, FreeRDP_SupportMonitorLayoutPdu))
994
0
      {
995
0
        MONITOR_DEF* monitors = NULL;
996
997
0
        IFCALL(client->AdjustMonitorsLayout, client);
998
999
        /* client supports the monitorLayout PDU, let's send him the monitors if any */
1000
0
        ret = STATE_RUN_SUCCESS;
1001
0
        if (freerdp_settings_get_uint32(settings, FreeRDP_MonitorCount) == 0)
1002
0
        {
1003
0
          const UINT32 w = freerdp_settings_get_uint32(settings, FreeRDP_DesktopWidth);
1004
0
          const UINT32 h = freerdp_settings_get_uint32(settings, FreeRDP_DesktopHeight);
1005
0
          const rdpMonitor primary = { .x = 0,
1006
0
                                     .y = 0,
1007
0
                                     .width = w,
1008
0
                                     .height = h,
1009
0
                                     .is_primary = TRUE,
1010
0
                                     .orig_screen = 0,
1011
0
                                     .attributes = { .physicalWidth = w,
1012
0
                                                     .physicalHeight = h,
1013
0
                                                     .orientation =
1014
0
                                                         ORIENTATION_LANDSCAPE,
1015
0
                                                     .desktopScaleFactor = 100,
1016
0
                                                     .deviceScaleFactor = 100 } };
1017
0
          if (!freerdp_settings_set_pointer_array(settings, FreeRDP_MonitorDefArray, 0,
1018
0
                                                  &primary))
1019
0
            ret = STATE_RUN_FAILED;
1020
0
          else if (!freerdp_settings_set_uint32(settings, FreeRDP_MonitorCount, 1))
1021
0
            ret = STATE_RUN_FAILED;
1022
0
        }
1023
0
        if (state_run_failed(ret))
1024
0
        {
1025
0
        }
1026
0
        else if (!display_convert_rdp_monitor_to_monitor_def(
1027
0
                     settings->MonitorCount, settings->MonitorDefArray, &monitors))
1028
0
        {
1029
0
          ret = STATE_RUN_FAILED;
1030
0
        }
1031
0
        else if (!freerdp_display_send_monitor_layout(rdp->context, settings->MonitorCount,
1032
0
                                                      monitors))
1033
0
        {
1034
0
          ret = STATE_RUN_FAILED;
1035
0
        }
1036
0
        else
1037
0
          ret = STATE_RUN_SUCCESS;
1038
0
        free(monitors);
1039
1040
0
        const size_t len = Stream_GetRemainingLength(s);
1041
0
        if (!state_run_failed(ret) && (len > 0))
1042
0
          ret = STATE_RUN_CONTINUE;
1043
0
      }
1044
0
      else
1045
0
      {
1046
0
        const size_t len = Stream_GetRemainingLength(s);
1047
0
        if (len > 0)
1048
0
          ret = STATE_RUN_CONTINUE;
1049
0
        else
1050
0
          ret = STATE_RUN_SUCCESS;
1051
0
      }
1052
0
      if (state_run_success(ret))
1053
0
      {
1054
0
        if (!rdp_server_transition_to_state(
1055
0
                rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE_CONFIRM_ACTIVE))
1056
0
          ret = STATE_RUN_FAILED;
1057
0
      }
1058
0
      break;
1059
1060
0
    case CONNECTION_STATE_CAPABILITIES_EXCHANGE_CONFIRM_ACTIVE:
1061
      /**
1062
       * During reactivation sequence the client might sent some input or channel data
1063
       * before receiving the Deactivate All PDU. We need to process them as usual.
1064
       */
1065
0
      ret = peer_recv_pdu(client, s);
1066
0
      break;
1067
1068
0
    case CONNECTION_STATE_FINALIZATION_SYNC:
1069
0
      ret = peer_recv_pdu(client, s);
1070
0
      if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_SYNCHRONIZE_PDU))
1071
0
      {
1072
0
        if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_FINALIZATION_COOPERATE))
1073
0
          ret = STATE_RUN_FAILED;
1074
0
      }
1075
0
      else
1076
0
        ret = peer_unexpected_client_message(rdp, FINALIZE_CS_SYNCHRONIZE_PDU);
1077
0
      break;
1078
0
    case CONNECTION_STATE_FINALIZATION_COOPERATE:
1079
0
      ret = peer_recv_pdu(client, s);
1080
0
      if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_CONTROL_COOPERATE_PDU))
1081
0
      {
1082
0
        if (!rdp_server_transition_to_state(rdp,
1083
0
                                            CONNECTION_STATE_FINALIZATION_REQUEST_CONTROL))
1084
0
          ret = STATE_RUN_FAILED;
1085
0
      }
1086
0
      else
1087
0
        ret = peer_unexpected_client_message(rdp, FINALIZE_CS_CONTROL_COOPERATE_PDU);
1088
0
      break;
1089
0
    case CONNECTION_STATE_FINALIZATION_REQUEST_CONTROL:
1090
0
      ret = peer_recv_pdu(client, s);
1091
0
      if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_CONTROL_REQUEST_PDU))
1092
0
      {
1093
0
        if (!rdp_send_server_control_granted_pdu(rdp))
1094
0
          ret = STATE_RUN_FAILED;
1095
0
        else if (!rdp_server_transition_to_state(
1096
0
                     rdp, CONNECTION_STATE_FINALIZATION_PERSISTENT_KEY_LIST))
1097
0
          ret = STATE_RUN_FAILED;
1098
0
      }
1099
0
      else
1100
0
        ret = peer_unexpected_client_message(rdp, FINALIZE_CS_CONTROL_REQUEST_PDU);
1101
0
      break;
1102
0
    case CONNECTION_STATE_FINALIZATION_PERSISTENT_KEY_LIST:
1103
0
      if (freerdp_settings_get_bool(settings, FreeRDP_BitmapCachePersistEnabled) &&
1104
0
          !rdp_finalize_is_flag_set(rdp, FINALIZE_DEACTIVATE_REACTIVATE))
1105
0
      {
1106
0
        ret = peer_recv_pdu(client, s);
1107
1108
0
        if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_PERSISTENT_KEY_LIST_PDU))
1109
0
        {
1110
0
          if (!rdp_server_transition_to_state(rdp,
1111
0
                                              CONNECTION_STATE_FINALIZATION_FONT_LIST))
1112
0
            ret = STATE_RUN_FAILED;
1113
0
        }
1114
0
        else
1115
0
          ret = peer_unexpected_client_message(rdp,
1116
0
                                               CONNECTION_STATE_FINALIZATION_FONT_LIST);
1117
0
      }
1118
0
      else
1119
0
      {
1120
0
        if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_FINALIZATION_FONT_LIST))
1121
0
          ret = STATE_RUN_FAILED;
1122
0
        else
1123
0
          ret = STATE_RUN_CONTINUE;
1124
0
      }
1125
0
      break;
1126
0
    case CONNECTION_STATE_FINALIZATION_FONT_LIST:
1127
0
      ret = peer_recv_pdu(client, s);
1128
0
      if (state_run_success(ret))
1129
0
      {
1130
0
        if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_FONT_LIST_PDU))
1131
0
        {
1132
0
          if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_ACTIVE))
1133
0
            ret = STATE_RUN_FAILED;
1134
0
          update_reset_state(rdp->update);
1135
0
          ret = STATE_RUN_CONTINUE;
1136
0
        }
1137
0
        else
1138
0
          ret = peer_unexpected_client_message(rdp, FINALIZE_CS_FONT_LIST_PDU);
1139
0
      }
1140
0
      break;
1141
1142
0
    case CONNECTION_STATE_ACTIVE:
1143
0
      ret = rdp_peer_handle_state_active(client);
1144
0
      if (ret >= STATE_RUN_ACTIVE)
1145
0
        ret = peer_recv_pdu(client, s);
1146
0
      break;
1147
1148
      /* States that must not happen in server state machine */
1149
0
    case CONNECTION_STATE_FINALIZATION_CLIENT_SYNC:
1150
0
    case CONNECTION_STATE_FINALIZATION_CLIENT_COOPERATE:
1151
0
    case CONNECTION_STATE_FINALIZATION_CLIENT_GRANTED_CONTROL:
1152
0
    case CONNECTION_STATE_FINALIZATION_CLIENT_FONT_MAP:
1153
0
    default:
1154
0
      WLog_ERR(TAG, "%s state %d", rdp_get_state_string(rdp), rdp_get_state(rdp));
1155
0
      break;
1156
0
  }
1157
1158
0
  return ret;
1159
0
}
1160
1161
static state_run_t peer_recv_callback(rdpTransport* transport, wStream* s, void* extra)
1162
0
{
1163
0
  char buffer[64] = { 0 };
1164
0
  state_run_t rc = STATE_RUN_FAILED;
1165
0
  const size_t start = Stream_GetPosition(s);
1166
0
  const rdpContext* context = transport_get_context(transport);
1167
0
  DWORD level = WLOG_TRACE;
1168
0
  static wLog* log = NULL;
1169
0
  if (!log)
1170
0
    log = WLog_Get(TAG);
1171
1172
0
  WINPR_ASSERT(context);
1173
0
  do
1174
0
  {
1175
0
    const rdpRdp* rdp = context->rdp;
1176
0
    const char* old = rdp_get_state_string(rdp);
1177
1178
0
    if (rc == STATE_RUN_TRY_AGAIN)
1179
0
      Stream_SetPosition(s, start);
1180
0
    rc = peer_recv_callback_internal(transport, s, extra);
1181
1182
0
    const size_t len = Stream_GetRemainingLength(s);
1183
0
    if ((len > 0) && !state_run_continue(rc))
1184
0
      level = WLOG_WARN;
1185
0
    WLog_Print(log, level,
1186
0
               "(server)[%s -> %s] current return %s [%" PRIuz " bytes not processed]", old,
1187
0
               rdp_get_state_string(rdp), state_run_result_string(rc, buffer, sizeof(buffer)),
1188
0
               len);
1189
0
  } while (state_run_continue(rc));
1190
1191
0
  return rc;
1192
0
}
1193
1194
static BOOL freerdp_peer_close(freerdp_peer* client)
1195
0
{
1196
0
  UINT32 SelectedProtocol = 0;
1197
0
  rdpContext* context = NULL;
1198
1199
0
  WINPR_ASSERT(client);
1200
1201
0
  context = client->context;
1202
0
  WINPR_ASSERT(context);
1203
0
  WINPR_ASSERT(context->settings);
1204
0
  WINPR_ASSERT(context->rdp);
1205
1206
  /** if negotiation has failed, we're not MCS connected. So don't
1207
   *  send anything else, or some mstsc will consider that as an error
1208
   */
1209
0
  SelectedProtocol = nego_get_selected_protocol(context->rdp->nego);
1210
1211
0
  if (SelectedProtocol & PROTOCOL_FAILED_NEGO)
1212
0
    return TRUE;
1213
1214
  /**
1215
   * [MS-RDPBCGR] 1.3.1.4.2 User-Initiated Disconnection Sequence on Server
1216
   * The server first sends the client a Deactivate All PDU followed by an
1217
   * optional MCS Disconnect Provider Ultimatum PDU.
1218
   */
1219
0
  if (!rdp_send_deactivate_all(context->rdp))
1220
0
    return FALSE;
1221
1222
0
  if (freerdp_settings_get_bool(context->settings, FreeRDP_SupportErrorInfoPdu))
1223
0
  {
1224
0
    rdp_send_error_info(context->rdp);
1225
0
  }
1226
1227
0
  return mcs_send_disconnect_provider_ultimatum(context->rdp->mcs);
1228
0
}
1229
1230
static void freerdp_peer_disconnect(freerdp_peer* client)
1231
0
{
1232
0
  rdpTransport* transport = NULL;
1233
0
  WINPR_ASSERT(client);
1234
1235
0
  transport = freerdp_get_transport(client->context);
1236
0
  transport_disconnect(transport);
1237
0
}
1238
1239
static BOOL freerdp_peer_send_channel_data(freerdp_peer* client, UINT16 channelId, const BYTE* data,
1240
                                           size_t size)
1241
0
{
1242
0
  WINPR_ASSERT(client);
1243
0
  WINPR_ASSERT(client->context);
1244
0
  WINPR_ASSERT(client->context->rdp);
1245
0
  return rdp_send_channel_data(client->context->rdp, channelId, data, size);
1246
0
}
1247
1248
static BOOL freerdp_peer_send_server_redirection_pdu(freerdp_peer* peer,
1249
                                                     const rdpRedirection* redirection)
1250
0
{
1251
0
  WINPR_ASSERT(peer);
1252
0
  WINPR_ASSERT(peer->context);
1253
1254
0
  wStream* s = rdp_send_stream_pdu_init(peer->context->rdp);
1255
0
  if (!s)
1256
0
    return FALSE;
1257
0
  if (!rdp_write_enhanced_security_redirection_packet(s, redirection))
1258
0
    goto fail;
1259
0
  if (!rdp_send_pdu(peer->context->rdp, s, PDU_TYPE_SERVER_REDIRECTION, 0))
1260
0
    goto fail;
1261
1262
0
  return rdp_reset_runtime_settings(peer->context->rdp);
1263
0
fail:
1264
0
  Stream_Release(s);
1265
0
  return FALSE;
1266
0
}
1267
1268
static BOOL freerdp_peer_send_channel_packet(freerdp_peer* client, UINT16 channelId,
1269
                                             size_t totalSize, UINT32 flags, const BYTE* data,
1270
                                             size_t chunkSize)
1271
0
{
1272
0
  WINPR_ASSERT(client);
1273
0
  WINPR_ASSERT(client->context);
1274
0
  WINPR_ASSERT(client->context->rdp);
1275
0
  return rdp_channel_send_packet(client->context->rdp, channelId, totalSize, flags, data,
1276
0
                                 chunkSize);
1277
0
}
1278
1279
static BOOL freerdp_peer_is_write_blocked(freerdp_peer* peer)
1280
0
{
1281
0
  rdpTransport* transport = NULL;
1282
0
  WINPR_ASSERT(peer);
1283
0
  WINPR_ASSERT(peer->context);
1284
0
  WINPR_ASSERT(peer->context->rdp);
1285
0
  WINPR_ASSERT(peer->context->rdp->transport);
1286
0
  transport = peer->context->rdp->transport;
1287
0
  return transport_is_write_blocked(transport);
1288
0
}
1289
1290
static int freerdp_peer_drain_output_buffer(freerdp_peer* peer)
1291
0
{
1292
0
  rdpTransport* transport = NULL;
1293
0
  WINPR_ASSERT(peer);
1294
0
  WINPR_ASSERT(peer->context);
1295
0
  WINPR_ASSERT(peer->context->rdp);
1296
0
  WINPR_ASSERT(peer->context->rdp->transport);
1297
0
  transport = peer->context->rdp->transport;
1298
0
  return transport_drain_output_buffer(transport);
1299
0
}
1300
1301
static BOOL freerdp_peer_has_more_to_read(freerdp_peer* peer)
1302
0
{
1303
0
  WINPR_ASSERT(peer);
1304
0
  WINPR_ASSERT(peer->context);
1305
0
  WINPR_ASSERT(peer->context->rdp);
1306
0
  return transport_have_more_bytes_to_read(peer->context->rdp->transport);
1307
0
}
1308
1309
static LicenseCallbackResult freerdp_peer_nolicense(freerdp_peer* peer, wStream* s)
1310
0
{
1311
0
  rdpRdp* rdp = NULL;
1312
1313
0
  WINPR_ASSERT(peer);
1314
0
  WINPR_ASSERT(peer->context);
1315
1316
0
  rdp = peer->context->rdp;
1317
1318
0
  if (!license_send_valid_client_error_packet(rdp))
1319
0
  {
1320
0
    WLog_ERR(TAG, "freerdp_peer_nolicense: license_send_valid_client_error_packet() failed");
1321
0
    return LICENSE_CB_ABORT;
1322
0
  }
1323
1324
0
  return LICENSE_CB_COMPLETED;
1325
0
}
1326
1327
BOOL freerdp_peer_context_new(freerdp_peer* client)
1328
6.97k
{
1329
6.97k
  return freerdp_peer_context_new_ex(client, NULL);
1330
6.97k
}
1331
1332
void freerdp_peer_context_free(freerdp_peer* client)
1333
6.97k
{
1334
6.97k
  if (!client)
1335
0
    return;
1336
1337
6.97k
  IFCALL(client->ContextFree, client, client->context);
1338
1339
6.97k
  if (client->context)
1340
6.97k
  {
1341
6.97k
    rdpContext* ctx = client->context;
1342
1343
6.97k
    CloseHandle(ctx->channelErrorEvent);
1344
6.97k
    ctx->channelErrorEvent = NULL;
1345
6.97k
    free(ctx->errorDescription);
1346
6.97k
    ctx->errorDescription = NULL;
1347
6.97k
    rdp_free(ctx->rdp);
1348
6.97k
    ctx->rdp = NULL;
1349
6.97k
    metrics_free(ctx->metrics);
1350
6.97k
    ctx->metrics = NULL;
1351
6.97k
    stream_dump_free(ctx->dump);
1352
6.97k
    ctx->dump = NULL;
1353
6.97k
    free(ctx);
1354
6.97k
  }
1355
6.97k
  client->context = NULL;
1356
6.97k
}
1357
1358
static const char* os_major_type_to_string(UINT16 osMajorType)
1359
0
{
1360
0
  switch (osMajorType)
1361
0
  {
1362
0
    case OSMAJORTYPE_UNSPECIFIED:
1363
0
      return "Unspecified platform";
1364
0
    case OSMAJORTYPE_WINDOWS:
1365
0
      return "Windows platform";
1366
0
    case OSMAJORTYPE_OS2:
1367
0
      return "OS/2 platform";
1368
0
    case OSMAJORTYPE_MACINTOSH:
1369
0
      return "Macintosh platform";
1370
0
    case OSMAJORTYPE_UNIX:
1371
0
      return "UNIX platform";
1372
0
    case OSMAJORTYPE_IOS:
1373
0
      return "iOS platform";
1374
0
    case OSMAJORTYPE_OSX:
1375
0
      return "OS X platform";
1376
0
    case OSMAJORTYPE_ANDROID:
1377
0
      return "Android platform";
1378
0
    case OSMAJORTYPE_CHROME_OS:
1379
0
      return "Chrome OS platform";
1380
0
  }
1381
1382
0
  return "Unknown platform";
1383
0
}
1384
1385
const char* freerdp_peer_os_major_type_string(freerdp_peer* client)
1386
0
{
1387
0
  rdpContext* context = NULL;
1388
0
  UINT16 osMajorType = 0;
1389
1390
0
  WINPR_ASSERT(client);
1391
1392
0
  context = client->context;
1393
0
  WINPR_ASSERT(context);
1394
0
  WINPR_ASSERT(context->settings);
1395
1396
0
  osMajorType = freerdp_settings_get_uint32(context->settings, FreeRDP_OsMajorType);
1397
1398
0
  return os_major_type_to_string(osMajorType);
1399
0
}
1400
1401
static const char* os_minor_type_to_string(UINT16 osMinorType)
1402
0
{
1403
0
  switch (osMinorType)
1404
0
  {
1405
0
    case OSMINORTYPE_UNSPECIFIED:
1406
0
      return "Unspecified version";
1407
0
    case OSMINORTYPE_WINDOWS_31X:
1408
0
      return "Windows 3.1x";
1409
0
    case OSMINORTYPE_WINDOWS_95:
1410
0
      return "Windows 95";
1411
0
    case OSMINORTYPE_WINDOWS_NT:
1412
0
      return "Windows NT";
1413
0
    case OSMINORTYPE_OS2_V21:
1414
0
      return "OS/2 2.1";
1415
0
    case OSMINORTYPE_POWER_PC:
1416
0
      return "PowerPC";
1417
0
    case OSMINORTYPE_MACINTOSH:
1418
0
      return "Macintosh";
1419
0
    case OSMINORTYPE_NATIVE_XSERVER:
1420
0
      return "Native X Server";
1421
0
    case OSMINORTYPE_PSEUDO_XSERVER:
1422
0
      return "Pseudo X Server";
1423
0
    case OSMINORTYPE_WINDOWS_RT:
1424
0
      return "Windows RT";
1425
0
  }
1426
1427
0
  return "Unknown version";
1428
0
}
1429
1430
const char* freerdp_peer_os_minor_type_string(freerdp_peer* client)
1431
0
{
1432
0
  rdpContext* context = NULL;
1433
0
  UINT16 osMinorType = 0;
1434
1435
0
  WINPR_ASSERT(client);
1436
1437
0
  context = client->context;
1438
0
  WINPR_ASSERT(context);
1439
0
  WINPR_ASSERT(context->settings);
1440
1441
0
  osMinorType = freerdp_settings_get_uint32(context->settings, FreeRDP_OsMinorType);
1442
1443
0
  return os_minor_type_to_string(osMinorType);
1444
0
}
1445
1446
freerdp_peer* freerdp_peer_new(int sockfd)
1447
0
{
1448
0
  UINT32 option_value = 0;
1449
0
  socklen_t option_len = 0;
1450
0
  freerdp_peer* client = (freerdp_peer*)calloc(1, sizeof(freerdp_peer));
1451
1452
0
  if (!client)
1453
0
    return NULL;
1454
1455
0
  option_value = TRUE;
1456
0
  option_len = sizeof(option_value);
1457
1458
0
  if (sockfd >= 0)
1459
0
    setsockopt(sockfd, IPPROTO_TCP, TCP_NODELAY, (void*)&option_value, option_len);
1460
1461
0
  if (client)
1462
0
  {
1463
0
    client->sockfd = sockfd;
1464
0
    client->ContextSize = sizeof(rdpContext);
1465
0
    client->Initialize = freerdp_peer_initialize;
1466
#if defined(WITH_FREERDP_DEPRECATED)
1467
    client->GetFileDescriptor = freerdp_peer_get_fds;
1468
#endif
1469
0
    client->GetEventHandle = freerdp_peer_get_event_handle;
1470
0
    client->GetEventHandles = freerdp_peer_get_event_handles;
1471
0
    client->CheckFileDescriptor = freerdp_peer_check_fds;
1472
0
    client->Close = freerdp_peer_close;
1473
0
    client->Disconnect = freerdp_peer_disconnect;
1474
0
    client->SendChannelData = freerdp_peer_send_channel_data;
1475
0
    client->SendChannelPacket = freerdp_peer_send_channel_packet;
1476
0
    client->SendServerRedirection = freerdp_peer_send_server_redirection_pdu;
1477
0
    client->IsWriteBlocked = freerdp_peer_is_write_blocked;
1478
0
    client->DrainOutputBuffer = freerdp_peer_drain_output_buffer;
1479
0
    client->HasMoreToRead = freerdp_peer_has_more_to_read;
1480
0
    client->VirtualChannelOpen = freerdp_peer_virtual_channel_open;
1481
0
    client->VirtualChannelClose = freerdp_peer_virtual_channel_close;
1482
0
    client->VirtualChannelWrite = freerdp_peer_virtual_channel_write;
1483
0
    client->VirtualChannelRead = NULL; /* must be defined by server application */
1484
0
    client->VirtualChannelGetData = freerdp_peer_virtual_channel_get_data;
1485
0
    client->VirtualChannelSetData = freerdp_peer_virtual_channel_set_data;
1486
0
    client->SetState = freerdp_peer_set_state;
1487
0
  }
1488
1489
0
  return client;
1490
0
}
1491
1492
void freerdp_peer_free(freerdp_peer* client)
1493
0
{
1494
0
  if (!client)
1495
0
    return;
1496
1497
0
  sspi_FreeAuthIdentity(&client->identity);
1498
0
  if (client->sockfd >= 0)
1499
0
    closesocket((SOCKET)client->sockfd);
1500
0
  free(client);
1501
0
}
1502
1503
static BOOL freerdp_peer_transport_setup(freerdp_peer* client)
1504
6.97k
{
1505
6.97k
  rdpRdp* rdp = NULL;
1506
1507
6.97k
  WINPR_ASSERT(client);
1508
6.97k
  WINPR_ASSERT(client->context);
1509
1510
6.97k
  rdp = client->context->rdp;
1511
6.97k
  WINPR_ASSERT(rdp);
1512
1513
6.97k
  if (!transport_attach(rdp->transport, client->sockfd))
1514
0
    return FALSE;
1515
6.97k
  client->sockfd = -1;
1516
1517
6.97k
  if (!transport_set_recv_callbacks(rdp->transport, peer_recv_callback, client))
1518
0
    return FALSE;
1519
1520
6.97k
  if (!transport_set_blocking_mode(rdp->transport, FALSE))
1521
0
    return FALSE;
1522
1523
6.97k
  return TRUE;
1524
6.97k
}
1525
1526
BOOL freerdp_peer_context_new_ex(freerdp_peer* client, const rdpSettings* settings)
1527
6.97k
{
1528
6.97k
  rdpRdp* rdp = NULL;
1529
6.97k
  rdpContext* context = NULL;
1530
6.97k
  BOOL ret = TRUE;
1531
1532
6.97k
  if (!client)
1533
0
    return FALSE;
1534
1535
6.97k
  WINPR_ASSERT(client->ContextSize >= sizeof(rdpContext));
1536
6.97k
  if (!(context = (rdpContext*)calloc(1, client->ContextSize)))
1537
0
    goto fail;
1538
1539
6.97k
  client->context = context;
1540
6.97k
  context->peer = client;
1541
6.97k
  context->ServerMode = TRUE;
1542
6.97k
  context->log = WLog_Get(TAG);
1543
6.97k
  if (!context->log)
1544
0
    goto fail;
1545
1546
6.97k
  if (settings)
1547
0
  {
1548
0
    context->settings = freerdp_settings_clone(settings);
1549
0
    if (!context->settings)
1550
0
      goto fail;
1551
0
  }
1552
1553
6.97k
  context->dump = stream_dump_new();
1554
6.97k
  if (!context->dump)
1555
0
    goto fail;
1556
6.97k
  if (!(context->metrics = metrics_new(context)))
1557
0
    goto fail;
1558
1559
6.97k
  if (!(rdp = rdp_new(context)))
1560
0
    goto fail;
1561
1562
6.97k
  rdp_log_build_warnings(rdp);
1563
1564
#if defined(WITH_FREERDP_DEPRECATED)
1565
  client->update = rdp->update;
1566
  client->settings = rdp->settings;
1567
  client->autodetect = rdp->autodetect;
1568
#endif
1569
6.97k
  context->rdp = rdp;
1570
6.97k
  context->input = rdp->input;
1571
6.97k
  context->update = rdp->update;
1572
6.97k
  context->settings = rdp->settings;
1573
6.97k
  context->autodetect = rdp->autodetect;
1574
6.97k
  update_register_server_callbacks(rdp->update);
1575
6.97k
  autodetect_register_server_callbacks(rdp->autodetect);
1576
1577
6.97k
  if (!(context->channelErrorEvent = CreateEvent(NULL, TRUE, FALSE, NULL)))
1578
0
  {
1579
0
    WLog_ERR(TAG, "CreateEvent failed!");
1580
0
    goto fail;
1581
0
  }
1582
1583
6.97k
  if (!(context->errorDescription = calloc(1, 500)))
1584
0
  {
1585
0
    WLog_ERR(TAG, "calloc failed!");
1586
0
    goto fail;
1587
0
  }
1588
1589
6.97k
  if (!freerdp_peer_transport_setup(client))
1590
0
    goto fail;
1591
1592
6.97k
  client->IsWriteBlocked = freerdp_peer_is_write_blocked;
1593
6.97k
  client->DrainOutputBuffer = freerdp_peer_drain_output_buffer;
1594
6.97k
  client->HasMoreToRead = freerdp_peer_has_more_to_read;
1595
6.97k
  client->LicenseCallback = freerdp_peer_nolicense;
1596
6.97k
  IFCALLRET(client->ContextNew, ret, client, client->context);
1597
1598
6.97k
  if (!ret)
1599
0
    goto fail;
1600
6.97k
  return TRUE;
1601
1602
0
fail:
1603
0
  WLog_ERR(TAG, "ContextNew callback failed");
1604
0
  freerdp_peer_context_free(client);
1605
0
  return FALSE;
1606
6.97k
}