/src/FreeRDP/libfreerdp/core/peer.c
Line | Count | Source (jump to first uncovered line) |
1 | | /** |
2 | | * FreeRDP: A Remote Desktop Protocol Implementation |
3 | | * RDP Server Peer |
4 | | * |
5 | | * Copyright 2011 Vic Lee |
6 | | * Copyright 2014 DI (FH) Martin Haimberger <martin.haimberger@thincast.com> |
7 | | * Copyright 2023 Armin Novak <anovak@thincast.com> |
8 | | * Copyright 2023 Thincast Technologies GmbH |
9 | | * |
10 | | * Licensed under the Apache License, Version 2.0 (the "License"); |
11 | | * you may not use this file except in compliance with the License. |
12 | | * You may obtain a copy of the License at |
13 | | * |
14 | | * http://www.apache.org/licenses/LICENSE-2.0 |
15 | | * |
16 | | * Unless required by applicable law or agreed to in writing, software |
17 | | * distributed under the License is distributed on an "AS IS" BASIS, |
18 | | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
19 | | * See the License for the specific language governing permissions and |
20 | | * limitations under the License. |
21 | | */ |
22 | | |
23 | | #include <freerdp/config.h> |
24 | | |
25 | | #include "settings.h" |
26 | | |
27 | | #include <winpr/assert.h> |
28 | | #include <winpr/crt.h> |
29 | | #include <winpr/winsock.h> |
30 | | |
31 | | #include "info.h" |
32 | | #include "display.h" |
33 | | |
34 | | #include <freerdp/log.h> |
35 | | #include <freerdp/streamdump.h> |
36 | | #include <freerdp/redirection.h> |
37 | | #include <freerdp/crypto/certificate.h> |
38 | | |
39 | | #include "rdp.h" |
40 | | #include "peer.h" |
41 | | #include "multitransport.h" |
42 | | |
43 | 6.97k | #define TAG FREERDP_TAG("core.peer") |
44 | | |
45 | | static state_run_t peer_recv_pdu(freerdp_peer* client, wStream* s); |
46 | | |
47 | | static HANDLE freerdp_peer_virtual_channel_open(freerdp_peer* client, const char* name, |
48 | | UINT32 flags) |
49 | 0 | { |
50 | 0 | UINT32 index = 0; |
51 | 0 | BOOL joined = FALSE; |
52 | 0 | rdpMcsChannel* mcsChannel = NULL; |
53 | 0 | rdpPeerChannel* peerChannel = NULL; |
54 | 0 | rdpMcs* mcs = NULL; |
55 | |
|
56 | 0 | WINPR_ASSERT(client); |
57 | 0 | WINPR_ASSERT(client->context); |
58 | 0 | WINPR_ASSERT(client->context->rdp); |
59 | 0 | WINPR_ASSERT(name); |
60 | 0 | mcs = client->context->rdp->mcs; |
61 | 0 | WINPR_ASSERT(mcs); |
62 | | |
63 | 0 | if (flags & WTS_CHANNEL_OPTION_DYNAMIC) |
64 | 0 | return NULL; /* not yet supported */ |
65 | | |
66 | 0 | const size_t length = strnlen(name, 9); |
67 | |
|
68 | 0 | if (length > 8) |
69 | 0 | return NULL; /* SVC maximum name length is 8 */ |
70 | | |
71 | 0 | for (; index < mcs->channelCount; index++) |
72 | 0 | { |
73 | 0 | mcsChannel = &(mcs->channels[index]); |
74 | |
|
75 | 0 | if (!mcsChannel->joined) |
76 | 0 | continue; |
77 | | |
78 | 0 | if (_strnicmp(name, mcsChannel->Name, length) == 0) |
79 | 0 | { |
80 | 0 | joined = TRUE; |
81 | 0 | break; |
82 | 0 | } |
83 | 0 | } |
84 | |
|
85 | 0 | if (!joined) |
86 | 0 | return NULL; /* channel is not joined */ |
87 | | |
88 | 0 | peerChannel = (rdpPeerChannel*)mcsChannel->handle; |
89 | |
|
90 | 0 | if (peerChannel) |
91 | 0 | { |
92 | | /* channel is already open */ |
93 | 0 | return (HANDLE)peerChannel; |
94 | 0 | } |
95 | | |
96 | 0 | peerChannel = server_channel_common_new(client, index, mcsChannel->ChannelId, 128, NULL, name); |
97 | |
|
98 | 0 | if (peerChannel) |
99 | 0 | { |
100 | 0 | peerChannel->channelFlags = flags; |
101 | 0 | peerChannel->mcsChannel = mcsChannel; |
102 | 0 | mcsChannel->handle = (void*)peerChannel; |
103 | 0 | } |
104 | |
|
105 | 0 | return (HANDLE)peerChannel; |
106 | 0 | } |
107 | | |
108 | | static BOOL freerdp_peer_virtual_channel_close(freerdp_peer* client, HANDLE hChannel) |
109 | 0 | { |
110 | 0 | rdpMcsChannel* mcsChannel = NULL; |
111 | 0 | rdpPeerChannel* peerChannel = NULL; |
112 | |
|
113 | 0 | WINPR_ASSERT(client); |
114 | | |
115 | 0 | if (!hChannel) |
116 | 0 | return FALSE; |
117 | | |
118 | 0 | peerChannel = (rdpPeerChannel*)hChannel; |
119 | 0 | mcsChannel = peerChannel->mcsChannel; |
120 | 0 | WINPR_ASSERT(mcsChannel); |
121 | 0 | mcsChannel->handle = NULL; |
122 | 0 | server_channel_common_free(peerChannel); |
123 | 0 | return TRUE; |
124 | 0 | } |
125 | | |
126 | | static int freerdp_peer_virtual_channel_write(freerdp_peer* client, HANDLE hChannel, |
127 | | const BYTE* buffer, UINT32 length) |
128 | 0 | { |
129 | 0 | wStream* s = NULL; |
130 | 0 | UINT32 flags = 0; |
131 | 0 | UINT32 chunkSize = 0; |
132 | 0 | UINT32 maxChunkSize = 0; |
133 | 0 | UINT32 totalLength = 0; |
134 | 0 | rdpPeerChannel* peerChannel = NULL; |
135 | 0 | rdpMcsChannel* mcsChannel = NULL; |
136 | 0 | rdpRdp* rdp = NULL; |
137 | |
|
138 | 0 | WINPR_ASSERT(client); |
139 | 0 | WINPR_ASSERT(client->context); |
140 | | |
141 | 0 | rdp = client->context->rdp; |
142 | 0 | WINPR_ASSERT(rdp); |
143 | 0 | WINPR_ASSERT(rdp->settings); |
144 | | |
145 | 0 | if (!hChannel) |
146 | 0 | return -1; |
147 | | |
148 | 0 | peerChannel = (rdpPeerChannel*)hChannel; |
149 | 0 | mcsChannel = peerChannel->mcsChannel; |
150 | 0 | WINPR_ASSERT(peerChannel); |
151 | 0 | WINPR_ASSERT(mcsChannel); |
152 | 0 | if (peerChannel->channelFlags & WTS_CHANNEL_OPTION_DYNAMIC) |
153 | 0 | return -1; /* not yet supported */ |
154 | | |
155 | 0 | maxChunkSize = rdp->settings->VCChunkSize; |
156 | 0 | totalLength = length; |
157 | 0 | flags = CHANNEL_FLAG_FIRST; |
158 | |
|
159 | 0 | while (length > 0) |
160 | 0 | { |
161 | 0 | s = rdp_send_stream_init(rdp); |
162 | |
|
163 | 0 | if (!s) |
164 | 0 | return -1; |
165 | | |
166 | 0 | if (length > maxChunkSize) |
167 | 0 | { |
168 | 0 | chunkSize = rdp->settings->VCChunkSize; |
169 | 0 | } |
170 | 0 | else |
171 | 0 | { |
172 | 0 | chunkSize = length; |
173 | 0 | flags |= CHANNEL_FLAG_LAST; |
174 | 0 | } |
175 | |
|
176 | 0 | if (mcsChannel->options & CHANNEL_OPTION_SHOW_PROTOCOL) |
177 | 0 | flags |= CHANNEL_FLAG_SHOW_PROTOCOL; |
178 | |
|
179 | 0 | Stream_Write_UINT32(s, totalLength); |
180 | 0 | Stream_Write_UINT32(s, flags); |
181 | |
|
182 | 0 | if (!Stream_EnsureRemainingCapacity(s, chunkSize)) |
183 | 0 | { |
184 | 0 | Stream_Release(s); |
185 | 0 | return -1; |
186 | 0 | } |
187 | | |
188 | 0 | Stream_Write(s, buffer, chunkSize); |
189 | |
|
190 | 0 | if (!rdp_send(rdp, s, peerChannel->channelId)) |
191 | 0 | return -1; |
192 | | |
193 | 0 | buffer += chunkSize; |
194 | 0 | length -= chunkSize; |
195 | 0 | flags = 0; |
196 | 0 | } |
197 | | |
198 | 0 | return 1; |
199 | 0 | } |
200 | | |
201 | | static void* freerdp_peer_virtual_channel_get_data(freerdp_peer* client, HANDLE hChannel) |
202 | 0 | { |
203 | 0 | rdpPeerChannel* peerChannel = (rdpPeerChannel*)hChannel; |
204 | |
|
205 | 0 | WINPR_ASSERT(client); |
206 | 0 | if (!hChannel) |
207 | 0 | return NULL; |
208 | | |
209 | 0 | return peerChannel->extra; |
210 | 0 | } |
211 | | |
212 | | static int freerdp_peer_virtual_channel_set_data(freerdp_peer* client, HANDLE hChannel, void* data) |
213 | 0 | { |
214 | 0 | rdpPeerChannel* peerChannel = (rdpPeerChannel*)hChannel; |
215 | |
|
216 | 0 | WINPR_ASSERT(client); |
217 | 0 | if (!hChannel) |
218 | 0 | return -1; |
219 | | |
220 | 0 | peerChannel->extra = data; |
221 | 0 | return 1; |
222 | 0 | } |
223 | | |
224 | | static BOOL freerdp_peer_set_state(freerdp_peer* client, CONNECTION_STATE state) |
225 | 0 | { |
226 | 0 | WINPR_ASSERT(client); |
227 | 0 | WINPR_ASSERT(client->context); |
228 | 0 | return rdp_server_transition_to_state(client->context->rdp, state); |
229 | 0 | } |
230 | | |
231 | | static BOOL freerdp_peer_initialize(freerdp_peer* client) |
232 | 0 | { |
233 | 0 | rdpRdp* rdp = NULL; |
234 | 0 | rdpSettings* settings = NULL; |
235 | |
|
236 | 0 | WINPR_ASSERT(client); |
237 | 0 | WINPR_ASSERT(client->context); |
238 | | |
239 | 0 | rdp = client->context->rdp; |
240 | 0 | WINPR_ASSERT(rdp); |
241 | | |
242 | 0 | settings = rdp->settings; |
243 | 0 | WINPR_ASSERT(settings); |
244 | | |
245 | 0 | settings->ServerMode = TRUE; |
246 | 0 | settings->FrameAcknowledge = 0; |
247 | 0 | settings->LocalConnection = client->local; |
248 | |
|
249 | 0 | const rdpCertificate* cert = |
250 | 0 | freerdp_settings_get_pointer(settings, FreeRDP_RdpServerCertificate); |
251 | 0 | if (!cert) |
252 | 0 | { |
253 | 0 | WLog_ERR(TAG, "Missing server certificate, can not continue."); |
254 | 0 | return FALSE; |
255 | 0 | } |
256 | | |
257 | 0 | if (freerdp_settings_get_bool(settings, FreeRDP_RdpSecurity)) |
258 | 0 | { |
259 | |
|
260 | 0 | if (!freerdp_certificate_is_rdp_security_compatible(cert)) |
261 | 0 | { |
262 | 0 | if (!freerdp_settings_set_bool(settings, FreeRDP_RdpSecurity, FALSE)) |
263 | 0 | return FALSE; |
264 | 0 | if (!freerdp_settings_set_bool(settings, FreeRDP_UseRdpSecurityLayer, FALSE)) |
265 | 0 | return FALSE; |
266 | 0 | } |
267 | 0 | } |
268 | | |
269 | 0 | nego_set_RCG_supported(rdp->nego, settings->RemoteCredentialGuard); |
270 | 0 | if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_INITIAL)) |
271 | 0 | return FALSE; |
272 | | |
273 | 0 | return TRUE; |
274 | 0 | } |
275 | | |
276 | | #if defined(WITH_FREERDP_DEPRECATED) |
277 | | static BOOL freerdp_peer_get_fds(freerdp_peer* client, void** rfds, int* rcount) |
278 | | { |
279 | | rdpTransport* transport = NULL; |
280 | | WINPR_ASSERT(client); |
281 | | WINPR_ASSERT(client->context); |
282 | | WINPR_ASSERT(client->context->rdp); |
283 | | |
284 | | transport = client->context->rdp->transport; |
285 | | WINPR_ASSERT(transport); |
286 | | transport_get_fds(transport, rfds, rcount); |
287 | | return TRUE; |
288 | | } |
289 | | #endif |
290 | | |
291 | | static HANDLE freerdp_peer_get_event_handle(freerdp_peer* client) |
292 | 0 | { |
293 | 0 | HANDLE hEvent = NULL; |
294 | 0 | rdpTransport* transport = NULL; |
295 | 0 | WINPR_ASSERT(client); |
296 | 0 | WINPR_ASSERT(client->context); |
297 | 0 | WINPR_ASSERT(client->context->rdp); |
298 | | |
299 | 0 | transport = client->context->rdp->transport; |
300 | 0 | hEvent = transport_get_front_bio(transport); |
301 | 0 | return hEvent; |
302 | 0 | } |
303 | | |
304 | | static DWORD freerdp_peer_get_event_handles(freerdp_peer* client, HANDLE* events, DWORD count) |
305 | 0 | { |
306 | 0 | WINPR_ASSERT(client); |
307 | 0 | WINPR_ASSERT(client->context); |
308 | 0 | WINPR_ASSERT(client->context->rdp); |
309 | 0 | return transport_get_event_handles(client->context->rdp->transport, events, count); |
310 | 0 | } |
311 | | |
312 | | static BOOL freerdp_peer_check_fds(freerdp_peer* peer) |
313 | 0 | { |
314 | 0 | int status = 0; |
315 | 0 | rdpRdp* rdp = NULL; |
316 | |
|
317 | 0 | WINPR_ASSERT(peer); |
318 | 0 | WINPR_ASSERT(peer->context); |
319 | | |
320 | 0 | rdp = peer->context->rdp; |
321 | 0 | status = rdp_check_fds(rdp); |
322 | |
|
323 | 0 | if (status < 0) |
324 | 0 | return FALSE; |
325 | | |
326 | 0 | return TRUE; |
327 | 0 | } |
328 | | |
329 | | static state_run_t peer_recv_data_pdu(freerdp_peer* client, wStream* s, UINT16 totalLength) |
330 | 0 | { |
331 | 0 | BYTE type = 0; |
332 | 0 | UINT16 length = 0; |
333 | 0 | UINT32 share_id = 0; |
334 | 0 | BYTE compressed_type = 0; |
335 | 0 | UINT16 compressed_len = 0; |
336 | 0 | rdpUpdate* update = NULL; |
337 | |
|
338 | 0 | WINPR_ASSERT(s); |
339 | 0 | WINPR_ASSERT(client); |
340 | 0 | WINPR_ASSERT(client->context); |
341 | 0 | rdpRdp* rdp = client->context->rdp; |
342 | 0 | WINPR_ASSERT(rdp); |
343 | 0 | WINPR_ASSERT(rdp->mcs); |
344 | | |
345 | 0 | update = client->context->update; |
346 | 0 | WINPR_ASSERT(update); |
347 | | |
348 | 0 | if (!rdp_read_share_data_header(rdp, s, &length, &type, &share_id, &compressed_type, |
349 | 0 | &compressed_len)) |
350 | 0 | return STATE_RUN_FAILED; |
351 | | |
352 | | #ifdef WITH_DEBUG_RDP |
353 | | WLog_Print(rdp->log, WLOG_DEBUG, "recv %s Data PDU (0x%02" PRIX8 "), length: %" PRIu16 "", |
354 | | data_pdu_type_to_string(type), type, length); |
355 | | #endif |
356 | | |
357 | 0 | switch (type) |
358 | 0 | { |
359 | 0 | case DATA_PDU_TYPE_SYNCHRONIZE: |
360 | 0 | if (!rdp_recv_client_synchronize_pdu(rdp, s)) |
361 | 0 | return STATE_RUN_FAILED; |
362 | | |
363 | 0 | break; |
364 | | |
365 | 0 | case DATA_PDU_TYPE_CONTROL: |
366 | 0 | if (!rdp_server_accept_client_control_pdu(rdp, s)) |
367 | 0 | return STATE_RUN_FAILED; |
368 | | |
369 | 0 | break; |
370 | | |
371 | 0 | case DATA_PDU_TYPE_INPUT: |
372 | 0 | if (!input_recv(rdp->input, s)) |
373 | 0 | return STATE_RUN_FAILED; |
374 | | |
375 | 0 | break; |
376 | | |
377 | 0 | case DATA_PDU_TYPE_BITMAP_CACHE_PERSISTENT_LIST: |
378 | 0 | if (!rdp_server_accept_client_persistent_key_list_pdu(rdp, s)) |
379 | 0 | return STATE_RUN_FAILED; |
380 | 0 | break; |
381 | | |
382 | 0 | case DATA_PDU_TYPE_FONT_LIST: |
383 | 0 | if (!rdp_server_accept_client_font_list_pdu(rdp, s)) |
384 | 0 | return STATE_RUN_FAILED; |
385 | | |
386 | 0 | return STATE_RUN_CONTINUE; // State changed, trigger rerun |
387 | | |
388 | 0 | case DATA_PDU_TYPE_SHUTDOWN_REQUEST: |
389 | 0 | mcs_send_disconnect_provider_ultimatum(rdp->mcs); |
390 | 0 | WLog_WARN(TAG, "disconnect provider ultimatum sent to peer, closing connection"); |
391 | 0 | return STATE_RUN_QUIT_SESSION; |
392 | | |
393 | 0 | case DATA_PDU_TYPE_FRAME_ACKNOWLEDGE: |
394 | 0 | if (!Stream_CheckAndLogRequiredLength(TAG, s, 4)) |
395 | 0 | return STATE_RUN_FAILED; |
396 | | |
397 | 0 | Stream_Read_UINT32(s, client->ack_frame_id); |
398 | 0 | IFCALL(update->SurfaceFrameAcknowledge, update->context, client->ack_frame_id); |
399 | 0 | break; |
400 | | |
401 | 0 | case DATA_PDU_TYPE_REFRESH_RECT: |
402 | 0 | if (!update_read_refresh_rect(update, s)) |
403 | 0 | return STATE_RUN_FAILED; |
404 | | |
405 | 0 | break; |
406 | | |
407 | 0 | case DATA_PDU_TYPE_SUPPRESS_OUTPUT: |
408 | 0 | if (!update_read_suppress_output(update, s)) |
409 | 0 | return STATE_RUN_FAILED; |
410 | | |
411 | 0 | break; |
412 | | |
413 | 0 | default: |
414 | 0 | WLog_ERR(TAG, "Data PDU type %" PRIu8 "", type); |
415 | 0 | break; |
416 | 0 | } |
417 | | |
418 | 0 | return STATE_RUN_SUCCESS; |
419 | 0 | } |
420 | | |
421 | | static state_run_t peer_recv_tpkt_pdu(freerdp_peer* client, wStream* s) |
422 | 0 | { |
423 | 0 | state_run_t rc = STATE_RUN_SUCCESS; |
424 | 0 | rdpRdp* rdp = NULL; |
425 | 0 | UINT16 length = 0; |
426 | 0 | UINT16 pduType = 0; |
427 | 0 | UINT16 pduSource = 0; |
428 | 0 | UINT16 channelId = 0; |
429 | 0 | UINT16 securityFlags = 0; |
430 | 0 | rdpSettings* settings = NULL; |
431 | |
|
432 | 0 | WINPR_ASSERT(s); |
433 | 0 | WINPR_ASSERT(client); |
434 | 0 | WINPR_ASSERT(client->context); |
435 | | |
436 | 0 | rdp = client->context->rdp; |
437 | 0 | WINPR_ASSERT(rdp); |
438 | 0 | WINPR_ASSERT(rdp->mcs); |
439 | | |
440 | 0 | settings = client->context->settings; |
441 | 0 | WINPR_ASSERT(settings); |
442 | | |
443 | 0 | if (!rdp_read_header(rdp, s, &length, &channelId)) |
444 | 0 | return STATE_RUN_FAILED; |
445 | | |
446 | 0 | rdp->inPackets++; |
447 | 0 | if (freerdp_shall_disconnect_context(rdp->context)) |
448 | 0 | return STATE_RUN_SUCCESS; |
449 | | |
450 | 0 | if (rdp_get_state(rdp) <= CONNECTION_STATE_LICENSING) |
451 | 0 | { |
452 | 0 | if (!rdp_read_security_header(rdp, s, &securityFlags, &length)) |
453 | 0 | return STATE_RUN_FAILED; |
454 | 0 | if (securityFlags & SEC_ENCRYPT) |
455 | 0 | { |
456 | 0 | if (!rdp_decrypt(rdp, s, &length, securityFlags)) |
457 | 0 | return STATE_RUN_FAILED; |
458 | 0 | } |
459 | 0 | return rdp_recv_message_channel_pdu(rdp, s, securityFlags); |
460 | 0 | } |
461 | | |
462 | 0 | if (settings->UseRdpSecurityLayer) |
463 | 0 | { |
464 | 0 | if (!rdp_read_security_header(rdp, s, &securityFlags, &length)) |
465 | 0 | return STATE_RUN_FAILED; |
466 | | |
467 | 0 | if (securityFlags & SEC_ENCRYPT) |
468 | 0 | { |
469 | 0 | if (!rdp_decrypt(rdp, s, &length, securityFlags)) |
470 | 0 | return STATE_RUN_FAILED; |
471 | 0 | } |
472 | 0 | } |
473 | | |
474 | 0 | if (channelId == MCS_GLOBAL_CHANNEL_ID) |
475 | 0 | { |
476 | 0 | char buffer[256] = { 0 }; |
477 | 0 | UINT16 pduLength = 0; |
478 | 0 | UINT16 remain = 0; |
479 | 0 | if (!rdp_read_share_control_header(rdp, s, &pduLength, &remain, &pduType, &pduSource)) |
480 | 0 | return STATE_RUN_FAILED; |
481 | | |
482 | 0 | settings->PduSource = pduSource; |
483 | |
|
484 | 0 | WLog_DBG(TAG, "Received %s", pdu_type_to_str(pduType, buffer, sizeof(buffer))); |
485 | 0 | switch (pduType) |
486 | 0 | { |
487 | 0 | case PDU_TYPE_DATA: |
488 | 0 | rc = peer_recv_data_pdu(client, s, pduLength); |
489 | 0 | break; |
490 | | |
491 | 0 | case PDU_TYPE_CONFIRM_ACTIVE: |
492 | 0 | if (!rdp_server_accept_confirm_active(rdp, s, pduLength)) |
493 | 0 | return STATE_RUN_FAILED; |
494 | | |
495 | 0 | break; |
496 | | |
497 | 0 | case PDU_TYPE_FLOW_RESPONSE: |
498 | 0 | case PDU_TYPE_FLOW_STOP: |
499 | 0 | case PDU_TYPE_FLOW_TEST: |
500 | 0 | if (!Stream_SafeSeek(s, remain)) |
501 | 0 | { |
502 | 0 | WLog_WARN(TAG, "Short PDU, need %" PRIuz " bytes, got %" PRIuz, remain, |
503 | 0 | Stream_GetRemainingLength(s)); |
504 | 0 | return STATE_RUN_FAILED; |
505 | 0 | } |
506 | 0 | break; |
507 | | |
508 | 0 | default: |
509 | 0 | WLog_ERR(TAG, "Client sent unknown pduType %" PRIu16 "", pduType); |
510 | 0 | return STATE_RUN_FAILED; |
511 | 0 | } |
512 | 0 | } |
513 | 0 | else if ((rdp->mcs->messageChannelId > 0) && (channelId == rdp->mcs->messageChannelId)) |
514 | 0 | { |
515 | 0 | if (!settings->UseRdpSecurityLayer) |
516 | 0 | { |
517 | 0 | if (!rdp_read_security_header(rdp, s, &securityFlags, NULL)) |
518 | 0 | return STATE_RUN_FAILED; |
519 | 0 | } |
520 | | |
521 | 0 | return rdp_recv_message_channel_pdu(rdp, s, securityFlags); |
522 | 0 | } |
523 | 0 | else |
524 | 0 | { |
525 | 0 | if (!freerdp_channel_peer_process(client, s, channelId)) |
526 | 0 | return STATE_RUN_FAILED; |
527 | 0 | } |
528 | 0 | if (!tpkt_ensure_stream_consumed(s, length)) |
529 | 0 | return STATE_RUN_FAILED; |
530 | | |
531 | 0 | return rc; |
532 | 0 | } |
533 | | |
534 | | static state_run_t peer_recv_handle_auto_detect(freerdp_peer* client, wStream* s) |
535 | 0 | { |
536 | 0 | state_run_t ret = STATE_RUN_FAILED; |
537 | 0 | rdpRdp* rdp = NULL; |
538 | |
|
539 | 0 | WINPR_ASSERT(client); |
540 | 0 | WINPR_ASSERT(s); |
541 | 0 | WINPR_ASSERT(client->context); |
542 | | |
543 | 0 | rdp = client->context->rdp; |
544 | 0 | WINPR_ASSERT(rdp); |
545 | | |
546 | 0 | const rdpSettings* settings = client->context->settings; |
547 | 0 | WINPR_ASSERT(settings); |
548 | | |
549 | 0 | if (freerdp_settings_get_bool(settings, FreeRDP_NetworkAutoDetect)) |
550 | 0 | { |
551 | 0 | switch (rdp_get_state(rdp)) |
552 | 0 | { |
553 | 0 | case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_REQUEST: |
554 | 0 | autodetect_on_connect_time_auto_detect_begin(rdp->autodetect); |
555 | 0 | switch (autodetect_get_state(rdp->autodetect)) |
556 | 0 | { |
557 | 0 | case FREERDP_AUTODETECT_STATE_REQUEST: |
558 | 0 | ret = STATE_RUN_SUCCESS; |
559 | 0 | if (!rdp_server_transition_to_state( |
560 | 0 | rdp, CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_RESPONSE)) |
561 | 0 | return STATE_RUN_FAILED; |
562 | 0 | break; |
563 | 0 | case FREERDP_AUTODETECT_STATE_COMPLETE: |
564 | 0 | ret = STATE_RUN_CONTINUE; /* Rerun in next state */ |
565 | 0 | if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_LICENSING)) |
566 | 0 | return STATE_RUN_FAILED; |
567 | 0 | break; |
568 | 0 | default: |
569 | 0 | break; |
570 | 0 | } |
571 | 0 | break; |
572 | 0 | case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_RESPONSE: |
573 | 0 | ret = peer_recv_pdu(client, s); |
574 | 0 | if (state_run_success(ret)) |
575 | 0 | { |
576 | 0 | autodetect_on_connect_time_auto_detect_progress(rdp->autodetect); |
577 | 0 | switch (autodetect_get_state(rdp->autodetect)) |
578 | 0 | { |
579 | 0 | case FREERDP_AUTODETECT_STATE_REQUEST: |
580 | 0 | ret = STATE_RUN_SUCCESS; |
581 | 0 | break; |
582 | 0 | case FREERDP_AUTODETECT_STATE_COMPLETE: |
583 | 0 | ret = STATE_RUN_CONTINUE; /* Rerun in next state */ |
584 | 0 | if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_LICENSING)) |
585 | 0 | return STATE_RUN_FAILED; |
586 | 0 | break; |
587 | 0 | default: |
588 | 0 | break; |
589 | 0 | } |
590 | 0 | } |
591 | 0 | break; |
592 | 0 | default: |
593 | 0 | WINPR_ASSERT(FALSE); |
594 | 0 | break; |
595 | 0 | } |
596 | 0 | } |
597 | 0 | else |
598 | 0 | { |
599 | 0 | if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_LICENSING)) |
600 | 0 | return STATE_RUN_FAILED; |
601 | | |
602 | 0 | ret = STATE_RUN_CONTINUE; /* Rerun in next state */ |
603 | 0 | } |
604 | | |
605 | 0 | return ret; |
606 | 0 | } |
607 | | |
608 | | static state_run_t peer_recv_handle_licensing(freerdp_peer* client, wStream* s) |
609 | 0 | { |
610 | 0 | state_run_t ret = STATE_RUN_FAILED; |
611 | 0 | rdpRdp* rdp = NULL; |
612 | 0 | rdpSettings* settings = NULL; |
613 | |
|
614 | 0 | WINPR_ASSERT(client); |
615 | 0 | WINPR_ASSERT(s); |
616 | 0 | WINPR_ASSERT(client->context); |
617 | | |
618 | 0 | rdp = client->context->rdp; |
619 | 0 | WINPR_ASSERT(rdp); |
620 | | |
621 | 0 | settings = rdp->settings; |
622 | 0 | WINPR_ASSERT(settings); |
623 | | |
624 | 0 | switch (license_get_state(rdp->license)) |
625 | 0 | { |
626 | 0 | case LICENSE_STATE_INITIAL: |
627 | 0 | { |
628 | 0 | const BOOL required = |
629 | 0 | freerdp_settings_get_bool(settings, FreeRDP_ServerLicenseRequired); |
630 | |
|
631 | 0 | if (required) |
632 | 0 | { |
633 | 0 | if (!license_server_configure(rdp->license)) |
634 | 0 | ret = STATE_RUN_FAILED; |
635 | 0 | else if (!license_server_send_request(rdp->license)) |
636 | 0 | ret = STATE_RUN_FAILED; |
637 | 0 | else |
638 | 0 | ret = STATE_RUN_SUCCESS; |
639 | 0 | } |
640 | 0 | else |
641 | 0 | { |
642 | 0 | if (license_send_valid_client_error_packet(rdp)) |
643 | 0 | ret = STATE_RUN_CONTINUE; /* Rerun in next state, might be capabilities */ |
644 | 0 | } |
645 | 0 | } |
646 | 0 | break; |
647 | 0 | case LICENSE_STATE_COMPLETED: |
648 | 0 | ret = STATE_RUN_CONTINUE; /* Licensing completed, continue in next state */ |
649 | 0 | break; |
650 | 0 | case LICENSE_STATE_ABORTED: |
651 | 0 | ret = STATE_RUN_FAILED; |
652 | 0 | break; |
653 | 0 | default: |
654 | 0 | ret = peer_recv_pdu(client, s); |
655 | 0 | break; |
656 | 0 | } |
657 | | |
658 | 0 | return ret; |
659 | 0 | } |
660 | | |
661 | | static state_run_t peer_recv_fastpath_pdu(freerdp_peer* client, wStream* s) |
662 | 0 | { |
663 | 0 | rdpRdp* rdp = NULL; |
664 | 0 | UINT16 length = 0; |
665 | 0 | BOOL rc = 0; |
666 | 0 | rdpFastPath* fastpath = NULL; |
667 | |
|
668 | 0 | WINPR_ASSERT(s); |
669 | 0 | WINPR_ASSERT(client); |
670 | 0 | WINPR_ASSERT(client->context); |
671 | | |
672 | 0 | rdp = client->context->rdp; |
673 | 0 | WINPR_ASSERT(rdp); |
674 | | |
675 | 0 | fastpath = rdp->fastpath; |
676 | 0 | WINPR_ASSERT(fastpath); |
677 | | |
678 | 0 | rc = fastpath_read_header_rdp(fastpath, s, &length); |
679 | |
|
680 | 0 | if (!rc || (length == 0)) |
681 | 0 | { |
682 | 0 | WLog_ERR(TAG, "incorrect FastPath PDU header length %" PRIu16 "", length); |
683 | 0 | return STATE_RUN_FAILED; |
684 | 0 | } |
685 | 0 | if (!Stream_CheckAndLogRequiredLength(TAG, s, length)) |
686 | 0 | return STATE_RUN_FAILED; |
687 | | |
688 | 0 | if (!fastpath_decrypt(fastpath, s, &length)) |
689 | 0 | return STATE_RUN_FAILED; |
690 | | |
691 | 0 | rdp->inPackets++; |
692 | |
|
693 | 0 | return fastpath_recv_inputs(fastpath, s); |
694 | 0 | } |
695 | | |
696 | | state_run_t peer_recv_pdu(freerdp_peer* client, wStream* s) |
697 | 0 | { |
698 | 0 | int rc = tpkt_verify_header(s); |
699 | |
|
700 | 0 | if (rc > 0) |
701 | 0 | return peer_recv_tpkt_pdu(client, s); |
702 | 0 | else if (rc == 0) |
703 | 0 | return peer_recv_fastpath_pdu(client, s); |
704 | 0 | else |
705 | 0 | return STATE_RUN_FAILED; |
706 | 0 | } |
707 | | |
708 | | static state_run_t peer_unexpected_client_message(rdpRdp* rdp, UINT32 flag) |
709 | 0 | { |
710 | 0 | char buffer[1024] = { 0 }; |
711 | 0 | WLog_WARN(TAG, "Unexpected client message in state %s, missing flag %s", |
712 | 0 | rdp_get_state_string(rdp), rdp_finalize_flags_to_str(flag, buffer, sizeof(buffer))); |
713 | 0 | return STATE_RUN_SUCCESS; /* we ignore this as per spec input PDU are already allowed */ |
714 | 0 | } |
715 | | |
716 | | state_run_t rdp_peer_handle_state_demand_active(freerdp_peer* client) |
717 | 0 | { |
718 | 0 | state_run_t ret = STATE_RUN_FAILED; |
719 | |
|
720 | 0 | WINPR_ASSERT(client); |
721 | 0 | WINPR_ASSERT(client->context); |
722 | | |
723 | 0 | rdpRdp* rdp = client->context->rdp; |
724 | 0 | WINPR_ASSERT(rdp); |
725 | | |
726 | 0 | if (client->Capabilities && !client->Capabilities(client)) |
727 | 0 | { |
728 | 0 | WLog_ERR(TAG, "[%s] freerdp_peer::Capabilities() callback failed", |
729 | 0 | rdp_get_state_string(rdp)); |
730 | 0 | } |
731 | 0 | else if (!rdp_send_demand_active(rdp)) |
732 | 0 | { |
733 | 0 | WLog_ERR(TAG, "[%s] rdp_send_demand_active() fail", rdp_get_state_string(rdp)); |
734 | 0 | } |
735 | 0 | else |
736 | 0 | { |
737 | 0 | if (!rdp_server_transition_to_state(rdp, |
738 | 0 | CONNECTION_STATE_CAPABILITIES_EXCHANGE_MONITOR_LAYOUT)) |
739 | 0 | return STATE_RUN_FAILED; |
740 | 0 | ret = STATE_RUN_CONTINUE; |
741 | 0 | } |
742 | 0 | return ret; |
743 | 0 | } |
744 | | |
745 | | /** \brief Handle server peer state ACTIVE: |
746 | | * On initial run (not connected, not activated) do not read data |
747 | | * |
748 | | * \return -1 in case of an error, 0 if no data needs to be processed, 1 to let |
749 | | * the state machine run again and 2 if peer_recv_pdu must be called. |
750 | | */ |
751 | | static state_run_t rdp_peer_handle_state_active(freerdp_peer* client) |
752 | 0 | { |
753 | 0 | state_run_t ret = STATE_RUN_FAILED; |
754 | |
|
755 | 0 | WINPR_ASSERT(client); |
756 | 0 | WINPR_ASSERT(client->context); |
757 | | |
758 | 0 | rdpRdp* rdp = client->context->rdp; |
759 | 0 | WINPR_ASSERT(rdp); |
760 | | |
761 | 0 | if (!client->connected) |
762 | 0 | { |
763 | | /** |
764 | | * PostConnect should only be called once and should not |
765 | | * be called after a reactivation sequence. |
766 | | */ |
767 | 0 | IFCALLRET(client->PostConnect, client->connected, client); |
768 | 0 | } |
769 | 0 | if (!client->connected) |
770 | 0 | { |
771 | 0 | WLog_ERR(TAG, "PostConnect for peer %p failed", client); |
772 | 0 | ret = STATE_RUN_FAILED; |
773 | 0 | } |
774 | 0 | else if (!client->activated) |
775 | 0 | { |
776 | 0 | BOOL activated = TRUE; |
777 | | |
778 | | /* Set client->activated TRUE before calling the Activate callback. |
779 | | * the Activate callback might reset the client->activated flag even if it returns success |
780 | | * (e.g. deactivate/reactivate sequence) */ |
781 | 0 | client->activated = TRUE; |
782 | 0 | IFCALLRET(client->Activate, activated, client); |
783 | |
|
784 | 0 | if (!activated) |
785 | 0 | { |
786 | 0 | WLog_ERR(TAG, "Activate for peer %p failed", client); |
787 | 0 | ret = STATE_RUN_FAILED; |
788 | 0 | } |
789 | 0 | else |
790 | 0 | ret = STATE_RUN_SUCCESS; |
791 | 0 | } |
792 | 0 | else |
793 | 0 | ret = STATE_RUN_ACTIVE; |
794 | 0 | return ret; |
795 | 0 | } |
796 | | |
797 | | static state_run_t peer_recv_callback_internal(rdpTransport* transport, wStream* s, void* extra) |
798 | 0 | { |
799 | 0 | UINT32 SelectedProtocol = 0; |
800 | 0 | freerdp_peer* client = (freerdp_peer*)extra; |
801 | 0 | rdpRdp* rdp = NULL; |
802 | 0 | state_run_t ret = STATE_RUN_FAILED; |
803 | 0 | rdpSettings* settings = NULL; |
804 | |
|
805 | 0 | WINPR_ASSERT(transport); |
806 | 0 | WINPR_ASSERT(client); |
807 | 0 | WINPR_ASSERT(client->context); |
808 | | |
809 | 0 | rdp = client->context->rdp; |
810 | 0 | WINPR_ASSERT(rdp); |
811 | | |
812 | 0 | settings = client->context->settings; |
813 | 0 | WINPR_ASSERT(settings); |
814 | | |
815 | 0 | IFCALL(client->ReachedState, client, rdp_get_state(rdp)); |
816 | 0 | switch (rdp_get_state(rdp)) |
817 | 0 | { |
818 | 0 | case CONNECTION_STATE_INITIAL: |
819 | 0 | if (rdp_server_transition_to_state(rdp, CONNECTION_STATE_NEGO)) |
820 | 0 | ret = STATE_RUN_CONTINUE; |
821 | 0 | break; |
822 | | |
823 | 0 | case CONNECTION_STATE_NEGO: |
824 | 0 | if (!rdp_server_accept_nego(rdp, s)) |
825 | 0 | { |
826 | 0 | WLog_ERR(TAG, "%s - rdp_server_accept_nego() fail", rdp_get_state_string(rdp)); |
827 | 0 | } |
828 | 0 | else |
829 | 0 | { |
830 | 0 | SelectedProtocol = nego_get_selected_protocol(rdp->nego); |
831 | 0 | settings->RdstlsSecurity = (SelectedProtocol & PROTOCOL_RDSTLS) ? TRUE : FALSE; |
832 | 0 | settings->NlaSecurity = (SelectedProtocol & PROTOCOL_HYBRID) ? TRUE : FALSE; |
833 | 0 | settings->TlsSecurity = (SelectedProtocol & PROTOCOL_SSL) ? TRUE : FALSE; |
834 | 0 | settings->RdpSecurity = (SelectedProtocol == PROTOCOL_RDP) ? TRUE : FALSE; |
835 | |
|
836 | 0 | if (SelectedProtocol & PROTOCOL_HYBRID) |
837 | 0 | { |
838 | 0 | SEC_WINNT_AUTH_IDENTITY_INFO* identity = |
839 | 0 | (SEC_WINNT_AUTH_IDENTITY_INFO*)nego_get_identity(rdp->nego); |
840 | 0 | sspi_CopyAuthIdentity(&client->identity, identity); |
841 | 0 | IFCALLRET(client->Logon, client->authenticated, client, &client->identity, |
842 | 0 | TRUE); |
843 | 0 | nego_free_nla(rdp->nego); |
844 | 0 | } |
845 | 0 | else |
846 | 0 | { |
847 | 0 | IFCALLRET(client->Logon, client->authenticated, client, &client->identity, |
848 | 0 | FALSE); |
849 | 0 | } |
850 | 0 | if (rdp_server_transition_to_state(rdp, CONNECTION_STATE_MCS_CREATE_REQUEST)) |
851 | 0 | ret = STATE_RUN_SUCCESS; |
852 | 0 | } |
853 | 0 | break; |
854 | | |
855 | 0 | case CONNECTION_STATE_NLA: |
856 | 0 | WINPR_ASSERT(FALSE); // TODO |
857 | 0 | break; |
858 | | |
859 | 0 | case CONNECTION_STATE_MCS_CREATE_REQUEST: |
860 | 0 | if (!rdp_server_accept_mcs_connect_initial(rdp, s)) |
861 | 0 | { |
862 | 0 | WLog_ERR(TAG, |
863 | 0 | "%s - " |
864 | 0 | "rdp_server_accept_mcs_connect_initial() fail", |
865 | 0 | rdp_get_state_string(rdp)); |
866 | 0 | } |
867 | 0 | else |
868 | 0 | ret = STATE_RUN_SUCCESS; |
869 | |
|
870 | 0 | break; |
871 | | |
872 | 0 | case CONNECTION_STATE_MCS_ERECT_DOMAIN: |
873 | 0 | if (!rdp_server_accept_mcs_erect_domain_request(rdp, s)) |
874 | 0 | { |
875 | 0 | WLog_ERR(TAG, |
876 | 0 | "%s - " |
877 | 0 | "rdp_server_accept_mcs_erect_domain_request() fail", |
878 | 0 | rdp_get_state_string(rdp)); |
879 | 0 | } |
880 | 0 | else |
881 | 0 | ret = STATE_RUN_SUCCESS; |
882 | |
|
883 | 0 | break; |
884 | | |
885 | 0 | case CONNECTION_STATE_MCS_ATTACH_USER: |
886 | 0 | if (!rdp_server_accept_mcs_attach_user_request(rdp, s)) |
887 | 0 | { |
888 | 0 | WLog_ERR(TAG, |
889 | 0 | "%s - " |
890 | 0 | "rdp_server_accept_mcs_attach_user_request() fail", |
891 | 0 | rdp_get_state_string(rdp)); |
892 | 0 | } |
893 | 0 | else |
894 | 0 | ret = STATE_RUN_SUCCESS; |
895 | |
|
896 | 0 | break; |
897 | | |
898 | 0 | case CONNECTION_STATE_MCS_CHANNEL_JOIN_REQUEST: |
899 | 0 | if (!rdp_server_accept_mcs_channel_join_request(rdp, s)) |
900 | 0 | { |
901 | 0 | WLog_ERR(TAG, |
902 | 0 | "%s - " |
903 | 0 | "rdp_server_accept_mcs_channel_join_request() fail", |
904 | 0 | rdp_get_state_string(rdp)); |
905 | 0 | } |
906 | 0 | else |
907 | 0 | ret = STATE_RUN_SUCCESS; |
908 | 0 | break; |
909 | | |
910 | 0 | case CONNECTION_STATE_RDP_SECURITY_COMMENCEMENT: |
911 | 0 | ret = STATE_RUN_SUCCESS; |
912 | |
|
913 | 0 | if (!rdp_server_establish_keys(rdp, s)) |
914 | 0 | { |
915 | 0 | WLog_ERR(TAG, |
916 | 0 | "%s - " |
917 | 0 | "rdp_server_establish_keys() fail", |
918 | 0 | rdp_get_state_string(rdp)); |
919 | 0 | ret = STATE_RUN_FAILED; |
920 | 0 | } |
921 | |
|
922 | 0 | if (state_run_success(ret)) |
923 | 0 | { |
924 | 0 | if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_SECURE_SETTINGS_EXCHANGE)) |
925 | 0 | ret = STATE_RUN_FAILED; |
926 | 0 | else if (Stream_GetRemainingLength(s) > 0) |
927 | 0 | ret = STATE_RUN_CONTINUE; /* Rerun function */ |
928 | 0 | } |
929 | 0 | break; |
930 | | |
931 | 0 | case CONNECTION_STATE_SECURE_SETTINGS_EXCHANGE: |
932 | 0 | if (rdp_recv_client_info(rdp, s)) |
933 | 0 | { |
934 | 0 | if (rdp_server_transition_to_state( |
935 | 0 | rdp, CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_REQUEST)) |
936 | 0 | ret = STATE_RUN_CONTINUE; |
937 | 0 | } |
938 | 0 | break; |
939 | | |
940 | 0 | case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_REQUEST: |
941 | 0 | case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_RESPONSE: |
942 | 0 | ret = peer_recv_handle_auto_detect(client, s); |
943 | 0 | break; |
944 | | |
945 | 0 | case CONNECTION_STATE_LICENSING: |
946 | 0 | ret = peer_recv_handle_licensing(client, s); |
947 | 0 | if (ret == STATE_RUN_CONTINUE) |
948 | 0 | { |
949 | 0 | if (!rdp_server_transition_to_state( |
950 | 0 | rdp, CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_REQUEST)) |
951 | 0 | ret = STATE_RUN_FAILED; |
952 | 0 | } |
953 | 0 | break; |
954 | | |
955 | 0 | case CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_REQUEST: |
956 | 0 | if (settings->SupportMultitransport && |
957 | 0 | ((settings->MultitransportFlags & INITIATE_REQUEST_PROTOCOL_UDPFECR) != 0)) |
958 | 0 | { |
959 | | /* only UDP reliable for now, nobody does lossy UDP (MS-RDPUDP only) these days */ |
960 | 0 | ret = multitransport_server_request(rdp->multitransport, |
961 | 0 | INITIATE_REQUEST_PROTOCOL_UDPFECR); |
962 | 0 | switch (ret) |
963 | 0 | { |
964 | 0 | case STATE_RUN_SUCCESS: |
965 | 0 | rdp_server_transition_to_state( |
966 | 0 | rdp, CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_RESPONSE); |
967 | 0 | break; |
968 | 0 | case STATE_RUN_CONTINUE: |
969 | | /* mismatch on the supported kind of UDP transports */ |
970 | 0 | rdp_server_transition_to_state( |
971 | 0 | rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE); |
972 | 0 | break; |
973 | 0 | default: |
974 | 0 | break; |
975 | 0 | } |
976 | 0 | } |
977 | 0 | else |
978 | 0 | { |
979 | 0 | if (rdp_server_transition_to_state( |
980 | 0 | rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE)) |
981 | 0 | ret = STATE_RUN_CONTINUE; /* Rerun, initialize next state */ |
982 | 0 | } |
983 | 0 | break; |
984 | 0 | case CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_RESPONSE: |
985 | 0 | ret = peer_recv_pdu(client, s); |
986 | 0 | break; |
987 | | |
988 | 0 | case CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE: |
989 | 0 | ret = rdp_peer_handle_state_demand_active(client); |
990 | 0 | break; |
991 | | |
992 | 0 | case CONNECTION_STATE_CAPABILITIES_EXCHANGE_MONITOR_LAYOUT: |
993 | 0 | if (freerdp_settings_get_bool(settings, FreeRDP_SupportMonitorLayoutPdu)) |
994 | 0 | { |
995 | 0 | MONITOR_DEF* monitors = NULL; |
996 | |
|
997 | 0 | IFCALL(client->AdjustMonitorsLayout, client); |
998 | | |
999 | | /* client supports the monitorLayout PDU, let's send him the monitors if any */ |
1000 | 0 | ret = STATE_RUN_SUCCESS; |
1001 | 0 | if (freerdp_settings_get_uint32(settings, FreeRDP_MonitorCount) == 0) |
1002 | 0 | { |
1003 | 0 | const UINT32 w = freerdp_settings_get_uint32(settings, FreeRDP_DesktopWidth); |
1004 | 0 | const UINT32 h = freerdp_settings_get_uint32(settings, FreeRDP_DesktopHeight); |
1005 | 0 | const rdpMonitor primary = { .x = 0, |
1006 | 0 | .y = 0, |
1007 | 0 | .width = w, |
1008 | 0 | .height = h, |
1009 | 0 | .is_primary = TRUE, |
1010 | 0 | .orig_screen = 0, |
1011 | 0 | .attributes = { .physicalWidth = w, |
1012 | 0 | .physicalHeight = h, |
1013 | 0 | .orientation = |
1014 | 0 | ORIENTATION_LANDSCAPE, |
1015 | 0 | .desktopScaleFactor = 100, |
1016 | 0 | .deviceScaleFactor = 100 } }; |
1017 | 0 | if (!freerdp_settings_set_pointer_array(settings, FreeRDP_MonitorDefArray, 0, |
1018 | 0 | &primary)) |
1019 | 0 | ret = STATE_RUN_FAILED; |
1020 | 0 | else if (!freerdp_settings_set_uint32(settings, FreeRDP_MonitorCount, 1)) |
1021 | 0 | ret = STATE_RUN_FAILED; |
1022 | 0 | } |
1023 | 0 | if (state_run_failed(ret)) |
1024 | 0 | { |
1025 | 0 | } |
1026 | 0 | else if (!display_convert_rdp_monitor_to_monitor_def( |
1027 | 0 | settings->MonitorCount, settings->MonitorDefArray, &monitors)) |
1028 | 0 | { |
1029 | 0 | ret = STATE_RUN_FAILED; |
1030 | 0 | } |
1031 | 0 | else if (!freerdp_display_send_monitor_layout(rdp->context, settings->MonitorCount, |
1032 | 0 | monitors)) |
1033 | 0 | { |
1034 | 0 | ret = STATE_RUN_FAILED; |
1035 | 0 | } |
1036 | 0 | else |
1037 | 0 | ret = STATE_RUN_SUCCESS; |
1038 | 0 | free(monitors); |
1039 | |
|
1040 | 0 | const size_t len = Stream_GetRemainingLength(s); |
1041 | 0 | if (!state_run_failed(ret) && (len > 0)) |
1042 | 0 | ret = STATE_RUN_CONTINUE; |
1043 | 0 | } |
1044 | 0 | else |
1045 | 0 | { |
1046 | 0 | const size_t len = Stream_GetRemainingLength(s); |
1047 | 0 | if (len > 0) |
1048 | 0 | ret = STATE_RUN_CONTINUE; |
1049 | 0 | else |
1050 | 0 | ret = STATE_RUN_SUCCESS; |
1051 | 0 | } |
1052 | 0 | if (state_run_success(ret)) |
1053 | 0 | { |
1054 | 0 | if (!rdp_server_transition_to_state( |
1055 | 0 | rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE_CONFIRM_ACTIVE)) |
1056 | 0 | ret = STATE_RUN_FAILED; |
1057 | 0 | } |
1058 | 0 | break; |
1059 | | |
1060 | 0 | case CONNECTION_STATE_CAPABILITIES_EXCHANGE_CONFIRM_ACTIVE: |
1061 | | /** |
1062 | | * During reactivation sequence the client might sent some input or channel data |
1063 | | * before receiving the Deactivate All PDU. We need to process them as usual. |
1064 | | */ |
1065 | 0 | ret = peer_recv_pdu(client, s); |
1066 | 0 | break; |
1067 | | |
1068 | 0 | case CONNECTION_STATE_FINALIZATION_SYNC: |
1069 | 0 | ret = peer_recv_pdu(client, s); |
1070 | 0 | if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_SYNCHRONIZE_PDU)) |
1071 | 0 | { |
1072 | 0 | if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_FINALIZATION_COOPERATE)) |
1073 | 0 | ret = STATE_RUN_FAILED; |
1074 | 0 | } |
1075 | 0 | else |
1076 | 0 | ret = peer_unexpected_client_message(rdp, FINALIZE_CS_SYNCHRONIZE_PDU); |
1077 | 0 | break; |
1078 | 0 | case CONNECTION_STATE_FINALIZATION_COOPERATE: |
1079 | 0 | ret = peer_recv_pdu(client, s); |
1080 | 0 | if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_CONTROL_COOPERATE_PDU)) |
1081 | 0 | { |
1082 | 0 | if (!rdp_server_transition_to_state(rdp, |
1083 | 0 | CONNECTION_STATE_FINALIZATION_REQUEST_CONTROL)) |
1084 | 0 | ret = STATE_RUN_FAILED; |
1085 | 0 | } |
1086 | 0 | else |
1087 | 0 | ret = peer_unexpected_client_message(rdp, FINALIZE_CS_CONTROL_COOPERATE_PDU); |
1088 | 0 | break; |
1089 | 0 | case CONNECTION_STATE_FINALIZATION_REQUEST_CONTROL: |
1090 | 0 | ret = peer_recv_pdu(client, s); |
1091 | 0 | if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_CONTROL_REQUEST_PDU)) |
1092 | 0 | { |
1093 | 0 | if (!rdp_send_server_control_granted_pdu(rdp)) |
1094 | 0 | ret = STATE_RUN_FAILED; |
1095 | 0 | else if (!rdp_server_transition_to_state( |
1096 | 0 | rdp, CONNECTION_STATE_FINALIZATION_PERSISTENT_KEY_LIST)) |
1097 | 0 | ret = STATE_RUN_FAILED; |
1098 | 0 | } |
1099 | 0 | else |
1100 | 0 | ret = peer_unexpected_client_message(rdp, FINALIZE_CS_CONTROL_REQUEST_PDU); |
1101 | 0 | break; |
1102 | 0 | case CONNECTION_STATE_FINALIZATION_PERSISTENT_KEY_LIST: |
1103 | 0 | if (freerdp_settings_get_bool(settings, FreeRDP_BitmapCachePersistEnabled) && |
1104 | 0 | !rdp_finalize_is_flag_set(rdp, FINALIZE_DEACTIVATE_REACTIVATE)) |
1105 | 0 | { |
1106 | 0 | ret = peer_recv_pdu(client, s); |
1107 | |
|
1108 | 0 | if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_PERSISTENT_KEY_LIST_PDU)) |
1109 | 0 | { |
1110 | 0 | if (!rdp_server_transition_to_state(rdp, |
1111 | 0 | CONNECTION_STATE_FINALIZATION_FONT_LIST)) |
1112 | 0 | ret = STATE_RUN_FAILED; |
1113 | 0 | } |
1114 | 0 | else |
1115 | 0 | ret = peer_unexpected_client_message(rdp, |
1116 | 0 | CONNECTION_STATE_FINALIZATION_FONT_LIST); |
1117 | 0 | } |
1118 | 0 | else |
1119 | 0 | { |
1120 | 0 | if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_FINALIZATION_FONT_LIST)) |
1121 | 0 | ret = STATE_RUN_FAILED; |
1122 | 0 | else |
1123 | 0 | ret = STATE_RUN_CONTINUE; |
1124 | 0 | } |
1125 | 0 | break; |
1126 | 0 | case CONNECTION_STATE_FINALIZATION_FONT_LIST: |
1127 | 0 | ret = peer_recv_pdu(client, s); |
1128 | 0 | if (state_run_success(ret)) |
1129 | 0 | { |
1130 | 0 | if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_FONT_LIST_PDU)) |
1131 | 0 | { |
1132 | 0 | if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_ACTIVE)) |
1133 | 0 | ret = STATE_RUN_FAILED; |
1134 | 0 | update_reset_state(rdp->update); |
1135 | 0 | ret = STATE_RUN_CONTINUE; |
1136 | 0 | } |
1137 | 0 | else |
1138 | 0 | ret = peer_unexpected_client_message(rdp, FINALIZE_CS_FONT_LIST_PDU); |
1139 | 0 | } |
1140 | 0 | break; |
1141 | | |
1142 | 0 | case CONNECTION_STATE_ACTIVE: |
1143 | 0 | ret = rdp_peer_handle_state_active(client); |
1144 | 0 | if (ret >= STATE_RUN_ACTIVE) |
1145 | 0 | ret = peer_recv_pdu(client, s); |
1146 | 0 | break; |
1147 | | |
1148 | | /* States that must not happen in server state machine */ |
1149 | 0 | case CONNECTION_STATE_FINALIZATION_CLIENT_SYNC: |
1150 | 0 | case CONNECTION_STATE_FINALIZATION_CLIENT_COOPERATE: |
1151 | 0 | case CONNECTION_STATE_FINALIZATION_CLIENT_GRANTED_CONTROL: |
1152 | 0 | case CONNECTION_STATE_FINALIZATION_CLIENT_FONT_MAP: |
1153 | 0 | default: |
1154 | 0 | WLog_ERR(TAG, "%s state %d", rdp_get_state_string(rdp), rdp_get_state(rdp)); |
1155 | 0 | break; |
1156 | 0 | } |
1157 | | |
1158 | 0 | return ret; |
1159 | 0 | } |
1160 | | |
1161 | | static state_run_t peer_recv_callback(rdpTransport* transport, wStream* s, void* extra) |
1162 | 0 | { |
1163 | 0 | char buffer[64] = { 0 }; |
1164 | 0 | state_run_t rc = STATE_RUN_FAILED; |
1165 | 0 | const size_t start = Stream_GetPosition(s); |
1166 | 0 | const rdpContext* context = transport_get_context(transport); |
1167 | 0 | DWORD level = WLOG_TRACE; |
1168 | 0 | static wLog* log = NULL; |
1169 | 0 | if (!log) |
1170 | 0 | log = WLog_Get(TAG); |
1171 | |
|
1172 | 0 | WINPR_ASSERT(context); |
1173 | 0 | do |
1174 | 0 | { |
1175 | 0 | const rdpRdp* rdp = context->rdp; |
1176 | 0 | const char* old = rdp_get_state_string(rdp); |
1177 | |
|
1178 | 0 | if (rc == STATE_RUN_TRY_AGAIN) |
1179 | 0 | Stream_SetPosition(s, start); |
1180 | 0 | rc = peer_recv_callback_internal(transport, s, extra); |
1181 | |
|
1182 | 0 | const size_t len = Stream_GetRemainingLength(s); |
1183 | 0 | if ((len > 0) && !state_run_continue(rc)) |
1184 | 0 | level = WLOG_WARN; |
1185 | 0 | WLog_Print(log, level, |
1186 | 0 | "(server)[%s -> %s] current return %s [%" PRIuz " bytes not processed]", old, |
1187 | 0 | rdp_get_state_string(rdp), state_run_result_string(rc, buffer, sizeof(buffer)), |
1188 | 0 | len); |
1189 | 0 | } while (state_run_continue(rc)); |
1190 | |
|
1191 | 0 | return rc; |
1192 | 0 | } |
1193 | | |
1194 | | static BOOL freerdp_peer_close(freerdp_peer* client) |
1195 | 0 | { |
1196 | 0 | UINT32 SelectedProtocol = 0; |
1197 | 0 | rdpContext* context = NULL; |
1198 | |
|
1199 | 0 | WINPR_ASSERT(client); |
1200 | | |
1201 | 0 | context = client->context; |
1202 | 0 | WINPR_ASSERT(context); |
1203 | 0 | WINPR_ASSERT(context->settings); |
1204 | 0 | WINPR_ASSERT(context->rdp); |
1205 | | |
1206 | | /** if negotiation has failed, we're not MCS connected. So don't |
1207 | | * send anything else, or some mstsc will consider that as an error |
1208 | | */ |
1209 | 0 | SelectedProtocol = nego_get_selected_protocol(context->rdp->nego); |
1210 | |
|
1211 | 0 | if (SelectedProtocol & PROTOCOL_FAILED_NEGO) |
1212 | 0 | return TRUE; |
1213 | | |
1214 | | /** |
1215 | | * [MS-RDPBCGR] 1.3.1.4.2 User-Initiated Disconnection Sequence on Server |
1216 | | * The server first sends the client a Deactivate All PDU followed by an |
1217 | | * optional MCS Disconnect Provider Ultimatum PDU. |
1218 | | */ |
1219 | 0 | if (!rdp_send_deactivate_all(context->rdp)) |
1220 | 0 | return FALSE; |
1221 | | |
1222 | 0 | if (freerdp_settings_get_bool(context->settings, FreeRDP_SupportErrorInfoPdu)) |
1223 | 0 | { |
1224 | 0 | rdp_send_error_info(context->rdp); |
1225 | 0 | } |
1226 | |
|
1227 | 0 | return mcs_send_disconnect_provider_ultimatum(context->rdp->mcs); |
1228 | 0 | } |
1229 | | |
1230 | | static void freerdp_peer_disconnect(freerdp_peer* client) |
1231 | 0 | { |
1232 | 0 | rdpTransport* transport = NULL; |
1233 | 0 | WINPR_ASSERT(client); |
1234 | | |
1235 | 0 | transport = freerdp_get_transport(client->context); |
1236 | 0 | transport_disconnect(transport); |
1237 | 0 | } |
1238 | | |
1239 | | static BOOL freerdp_peer_send_channel_data(freerdp_peer* client, UINT16 channelId, const BYTE* data, |
1240 | | size_t size) |
1241 | 0 | { |
1242 | 0 | WINPR_ASSERT(client); |
1243 | 0 | WINPR_ASSERT(client->context); |
1244 | 0 | WINPR_ASSERT(client->context->rdp); |
1245 | 0 | return rdp_send_channel_data(client->context->rdp, channelId, data, size); |
1246 | 0 | } |
1247 | | |
1248 | | static BOOL freerdp_peer_send_server_redirection_pdu(freerdp_peer* peer, |
1249 | | const rdpRedirection* redirection) |
1250 | 0 | { |
1251 | 0 | WINPR_ASSERT(peer); |
1252 | 0 | WINPR_ASSERT(peer->context); |
1253 | | |
1254 | 0 | wStream* s = rdp_send_stream_pdu_init(peer->context->rdp); |
1255 | 0 | if (!s) |
1256 | 0 | return FALSE; |
1257 | 0 | if (!rdp_write_enhanced_security_redirection_packet(s, redirection)) |
1258 | 0 | goto fail; |
1259 | 0 | if (!rdp_send_pdu(peer->context->rdp, s, PDU_TYPE_SERVER_REDIRECTION, 0)) |
1260 | 0 | goto fail; |
1261 | | |
1262 | 0 | return rdp_reset_runtime_settings(peer->context->rdp); |
1263 | 0 | fail: |
1264 | 0 | Stream_Release(s); |
1265 | 0 | return FALSE; |
1266 | 0 | } |
1267 | | |
1268 | | static BOOL freerdp_peer_send_channel_packet(freerdp_peer* client, UINT16 channelId, |
1269 | | size_t totalSize, UINT32 flags, const BYTE* data, |
1270 | | size_t chunkSize) |
1271 | 0 | { |
1272 | 0 | WINPR_ASSERT(client); |
1273 | 0 | WINPR_ASSERT(client->context); |
1274 | 0 | WINPR_ASSERT(client->context->rdp); |
1275 | 0 | return rdp_channel_send_packet(client->context->rdp, channelId, totalSize, flags, data, |
1276 | 0 | chunkSize); |
1277 | 0 | } |
1278 | | |
1279 | | static BOOL freerdp_peer_is_write_blocked(freerdp_peer* peer) |
1280 | 0 | { |
1281 | 0 | rdpTransport* transport = NULL; |
1282 | 0 | WINPR_ASSERT(peer); |
1283 | 0 | WINPR_ASSERT(peer->context); |
1284 | 0 | WINPR_ASSERT(peer->context->rdp); |
1285 | 0 | WINPR_ASSERT(peer->context->rdp->transport); |
1286 | 0 | transport = peer->context->rdp->transport; |
1287 | 0 | return transport_is_write_blocked(transport); |
1288 | 0 | } |
1289 | | |
1290 | | static int freerdp_peer_drain_output_buffer(freerdp_peer* peer) |
1291 | 0 | { |
1292 | 0 | rdpTransport* transport = NULL; |
1293 | 0 | WINPR_ASSERT(peer); |
1294 | 0 | WINPR_ASSERT(peer->context); |
1295 | 0 | WINPR_ASSERT(peer->context->rdp); |
1296 | 0 | WINPR_ASSERT(peer->context->rdp->transport); |
1297 | 0 | transport = peer->context->rdp->transport; |
1298 | 0 | return transport_drain_output_buffer(transport); |
1299 | 0 | } |
1300 | | |
1301 | | static BOOL freerdp_peer_has_more_to_read(freerdp_peer* peer) |
1302 | 0 | { |
1303 | 0 | WINPR_ASSERT(peer); |
1304 | 0 | WINPR_ASSERT(peer->context); |
1305 | 0 | WINPR_ASSERT(peer->context->rdp); |
1306 | 0 | return transport_have_more_bytes_to_read(peer->context->rdp->transport); |
1307 | 0 | } |
1308 | | |
1309 | | static LicenseCallbackResult freerdp_peer_nolicense(freerdp_peer* peer, wStream* s) |
1310 | 0 | { |
1311 | 0 | rdpRdp* rdp = NULL; |
1312 | |
|
1313 | 0 | WINPR_ASSERT(peer); |
1314 | 0 | WINPR_ASSERT(peer->context); |
1315 | | |
1316 | 0 | rdp = peer->context->rdp; |
1317 | |
|
1318 | 0 | if (!license_send_valid_client_error_packet(rdp)) |
1319 | 0 | { |
1320 | 0 | WLog_ERR(TAG, "freerdp_peer_nolicense: license_send_valid_client_error_packet() failed"); |
1321 | 0 | return LICENSE_CB_ABORT; |
1322 | 0 | } |
1323 | | |
1324 | 0 | return LICENSE_CB_COMPLETED; |
1325 | 0 | } |
1326 | | |
1327 | | BOOL freerdp_peer_context_new(freerdp_peer* client) |
1328 | 6.97k | { |
1329 | 6.97k | return freerdp_peer_context_new_ex(client, NULL); |
1330 | 6.97k | } |
1331 | | |
1332 | | void freerdp_peer_context_free(freerdp_peer* client) |
1333 | 6.97k | { |
1334 | 6.97k | if (!client) |
1335 | 0 | return; |
1336 | | |
1337 | 6.97k | IFCALL(client->ContextFree, client, client->context); |
1338 | | |
1339 | 6.97k | if (client->context) |
1340 | 6.97k | { |
1341 | 6.97k | rdpContext* ctx = client->context; |
1342 | | |
1343 | 6.97k | CloseHandle(ctx->channelErrorEvent); |
1344 | 6.97k | ctx->channelErrorEvent = NULL; |
1345 | 6.97k | free(ctx->errorDescription); |
1346 | 6.97k | ctx->errorDescription = NULL; |
1347 | 6.97k | rdp_free(ctx->rdp); |
1348 | 6.97k | ctx->rdp = NULL; |
1349 | 6.97k | metrics_free(ctx->metrics); |
1350 | 6.97k | ctx->metrics = NULL; |
1351 | 6.97k | stream_dump_free(ctx->dump); |
1352 | 6.97k | ctx->dump = NULL; |
1353 | 6.97k | free(ctx); |
1354 | 6.97k | } |
1355 | 6.97k | client->context = NULL; |
1356 | 6.97k | } |
1357 | | |
1358 | | static const char* os_major_type_to_string(UINT16 osMajorType) |
1359 | 0 | { |
1360 | 0 | switch (osMajorType) |
1361 | 0 | { |
1362 | 0 | case OSMAJORTYPE_UNSPECIFIED: |
1363 | 0 | return "Unspecified platform"; |
1364 | 0 | case OSMAJORTYPE_WINDOWS: |
1365 | 0 | return "Windows platform"; |
1366 | 0 | case OSMAJORTYPE_OS2: |
1367 | 0 | return "OS/2 platform"; |
1368 | 0 | case OSMAJORTYPE_MACINTOSH: |
1369 | 0 | return "Macintosh platform"; |
1370 | 0 | case OSMAJORTYPE_UNIX: |
1371 | 0 | return "UNIX platform"; |
1372 | 0 | case OSMAJORTYPE_IOS: |
1373 | 0 | return "iOS platform"; |
1374 | 0 | case OSMAJORTYPE_OSX: |
1375 | 0 | return "OS X platform"; |
1376 | 0 | case OSMAJORTYPE_ANDROID: |
1377 | 0 | return "Android platform"; |
1378 | 0 | case OSMAJORTYPE_CHROME_OS: |
1379 | 0 | return "Chrome OS platform"; |
1380 | 0 | } |
1381 | | |
1382 | 0 | return "Unknown platform"; |
1383 | 0 | } |
1384 | | |
1385 | | const char* freerdp_peer_os_major_type_string(freerdp_peer* client) |
1386 | 0 | { |
1387 | 0 | rdpContext* context = NULL; |
1388 | 0 | UINT16 osMajorType = 0; |
1389 | |
|
1390 | 0 | WINPR_ASSERT(client); |
1391 | | |
1392 | 0 | context = client->context; |
1393 | 0 | WINPR_ASSERT(context); |
1394 | 0 | WINPR_ASSERT(context->settings); |
1395 | | |
1396 | 0 | osMajorType = freerdp_settings_get_uint32(context->settings, FreeRDP_OsMajorType); |
1397 | |
|
1398 | 0 | return os_major_type_to_string(osMajorType); |
1399 | 0 | } |
1400 | | |
1401 | | static const char* os_minor_type_to_string(UINT16 osMinorType) |
1402 | 0 | { |
1403 | 0 | switch (osMinorType) |
1404 | 0 | { |
1405 | 0 | case OSMINORTYPE_UNSPECIFIED: |
1406 | 0 | return "Unspecified version"; |
1407 | 0 | case OSMINORTYPE_WINDOWS_31X: |
1408 | 0 | return "Windows 3.1x"; |
1409 | 0 | case OSMINORTYPE_WINDOWS_95: |
1410 | 0 | return "Windows 95"; |
1411 | 0 | case OSMINORTYPE_WINDOWS_NT: |
1412 | 0 | return "Windows NT"; |
1413 | 0 | case OSMINORTYPE_OS2_V21: |
1414 | 0 | return "OS/2 2.1"; |
1415 | 0 | case OSMINORTYPE_POWER_PC: |
1416 | 0 | return "PowerPC"; |
1417 | 0 | case OSMINORTYPE_MACINTOSH: |
1418 | 0 | return "Macintosh"; |
1419 | 0 | case OSMINORTYPE_NATIVE_XSERVER: |
1420 | 0 | return "Native X Server"; |
1421 | 0 | case OSMINORTYPE_PSEUDO_XSERVER: |
1422 | 0 | return "Pseudo X Server"; |
1423 | 0 | case OSMINORTYPE_WINDOWS_RT: |
1424 | 0 | return "Windows RT"; |
1425 | 0 | } |
1426 | | |
1427 | 0 | return "Unknown version"; |
1428 | 0 | } |
1429 | | |
1430 | | const char* freerdp_peer_os_minor_type_string(freerdp_peer* client) |
1431 | 0 | { |
1432 | 0 | rdpContext* context = NULL; |
1433 | 0 | UINT16 osMinorType = 0; |
1434 | |
|
1435 | 0 | WINPR_ASSERT(client); |
1436 | | |
1437 | 0 | context = client->context; |
1438 | 0 | WINPR_ASSERT(context); |
1439 | 0 | WINPR_ASSERT(context->settings); |
1440 | | |
1441 | 0 | osMinorType = freerdp_settings_get_uint32(context->settings, FreeRDP_OsMinorType); |
1442 | |
|
1443 | 0 | return os_minor_type_to_string(osMinorType); |
1444 | 0 | } |
1445 | | |
1446 | | freerdp_peer* freerdp_peer_new(int sockfd) |
1447 | 0 | { |
1448 | 0 | UINT32 option_value = 0; |
1449 | 0 | socklen_t option_len = 0; |
1450 | 0 | freerdp_peer* client = (freerdp_peer*)calloc(1, sizeof(freerdp_peer)); |
1451 | |
|
1452 | 0 | if (!client) |
1453 | 0 | return NULL; |
1454 | | |
1455 | 0 | option_value = TRUE; |
1456 | 0 | option_len = sizeof(option_value); |
1457 | |
|
1458 | 0 | if (sockfd >= 0) |
1459 | 0 | setsockopt(sockfd, IPPROTO_TCP, TCP_NODELAY, (void*)&option_value, option_len); |
1460 | |
|
1461 | 0 | if (client) |
1462 | 0 | { |
1463 | 0 | client->sockfd = sockfd; |
1464 | 0 | client->ContextSize = sizeof(rdpContext); |
1465 | 0 | client->Initialize = freerdp_peer_initialize; |
1466 | | #if defined(WITH_FREERDP_DEPRECATED) |
1467 | | client->GetFileDescriptor = freerdp_peer_get_fds; |
1468 | | #endif |
1469 | 0 | client->GetEventHandle = freerdp_peer_get_event_handle; |
1470 | 0 | client->GetEventHandles = freerdp_peer_get_event_handles; |
1471 | 0 | client->CheckFileDescriptor = freerdp_peer_check_fds; |
1472 | 0 | client->Close = freerdp_peer_close; |
1473 | 0 | client->Disconnect = freerdp_peer_disconnect; |
1474 | 0 | client->SendChannelData = freerdp_peer_send_channel_data; |
1475 | 0 | client->SendChannelPacket = freerdp_peer_send_channel_packet; |
1476 | 0 | client->SendServerRedirection = freerdp_peer_send_server_redirection_pdu; |
1477 | 0 | client->IsWriteBlocked = freerdp_peer_is_write_blocked; |
1478 | 0 | client->DrainOutputBuffer = freerdp_peer_drain_output_buffer; |
1479 | 0 | client->HasMoreToRead = freerdp_peer_has_more_to_read; |
1480 | 0 | client->VirtualChannelOpen = freerdp_peer_virtual_channel_open; |
1481 | 0 | client->VirtualChannelClose = freerdp_peer_virtual_channel_close; |
1482 | 0 | client->VirtualChannelWrite = freerdp_peer_virtual_channel_write; |
1483 | 0 | client->VirtualChannelRead = NULL; /* must be defined by server application */ |
1484 | 0 | client->VirtualChannelGetData = freerdp_peer_virtual_channel_get_data; |
1485 | 0 | client->VirtualChannelSetData = freerdp_peer_virtual_channel_set_data; |
1486 | 0 | client->SetState = freerdp_peer_set_state; |
1487 | 0 | } |
1488 | |
|
1489 | 0 | return client; |
1490 | 0 | } |
1491 | | |
1492 | | void freerdp_peer_free(freerdp_peer* client) |
1493 | 0 | { |
1494 | 0 | if (!client) |
1495 | 0 | return; |
1496 | | |
1497 | 0 | sspi_FreeAuthIdentity(&client->identity); |
1498 | 0 | if (client->sockfd >= 0) |
1499 | 0 | closesocket((SOCKET)client->sockfd); |
1500 | 0 | free(client); |
1501 | 0 | } |
1502 | | |
1503 | | static BOOL freerdp_peer_transport_setup(freerdp_peer* client) |
1504 | 6.97k | { |
1505 | 6.97k | rdpRdp* rdp = NULL; |
1506 | | |
1507 | 6.97k | WINPR_ASSERT(client); |
1508 | 6.97k | WINPR_ASSERT(client->context); |
1509 | | |
1510 | 6.97k | rdp = client->context->rdp; |
1511 | 6.97k | WINPR_ASSERT(rdp); |
1512 | | |
1513 | 6.97k | if (!transport_attach(rdp->transport, client->sockfd)) |
1514 | 0 | return FALSE; |
1515 | 6.97k | client->sockfd = -1; |
1516 | | |
1517 | 6.97k | if (!transport_set_recv_callbacks(rdp->transport, peer_recv_callback, client)) |
1518 | 0 | return FALSE; |
1519 | | |
1520 | 6.97k | if (!transport_set_blocking_mode(rdp->transport, FALSE)) |
1521 | 0 | return FALSE; |
1522 | | |
1523 | 6.97k | return TRUE; |
1524 | 6.97k | } |
1525 | | |
1526 | | BOOL freerdp_peer_context_new_ex(freerdp_peer* client, const rdpSettings* settings) |
1527 | 6.97k | { |
1528 | 6.97k | rdpRdp* rdp = NULL; |
1529 | 6.97k | rdpContext* context = NULL; |
1530 | 6.97k | BOOL ret = TRUE; |
1531 | | |
1532 | 6.97k | if (!client) |
1533 | 0 | return FALSE; |
1534 | | |
1535 | 6.97k | WINPR_ASSERT(client->ContextSize >= sizeof(rdpContext)); |
1536 | 6.97k | if (!(context = (rdpContext*)calloc(1, client->ContextSize))) |
1537 | 0 | goto fail; |
1538 | | |
1539 | 6.97k | client->context = context; |
1540 | 6.97k | context->peer = client; |
1541 | 6.97k | context->ServerMode = TRUE; |
1542 | 6.97k | context->log = WLog_Get(TAG); |
1543 | 6.97k | if (!context->log) |
1544 | 0 | goto fail; |
1545 | | |
1546 | 6.97k | if (settings) |
1547 | 0 | { |
1548 | 0 | context->settings = freerdp_settings_clone(settings); |
1549 | 0 | if (!context->settings) |
1550 | 0 | goto fail; |
1551 | 0 | } |
1552 | | |
1553 | 6.97k | context->dump = stream_dump_new(); |
1554 | 6.97k | if (!context->dump) |
1555 | 0 | goto fail; |
1556 | 6.97k | if (!(context->metrics = metrics_new(context))) |
1557 | 0 | goto fail; |
1558 | | |
1559 | 6.97k | if (!(rdp = rdp_new(context))) |
1560 | 0 | goto fail; |
1561 | | |
1562 | 6.97k | rdp_log_build_warnings(rdp); |
1563 | | |
1564 | | #if defined(WITH_FREERDP_DEPRECATED) |
1565 | | client->update = rdp->update; |
1566 | | client->settings = rdp->settings; |
1567 | | client->autodetect = rdp->autodetect; |
1568 | | #endif |
1569 | 6.97k | context->rdp = rdp; |
1570 | 6.97k | context->input = rdp->input; |
1571 | 6.97k | context->update = rdp->update; |
1572 | 6.97k | context->settings = rdp->settings; |
1573 | 6.97k | context->autodetect = rdp->autodetect; |
1574 | 6.97k | update_register_server_callbacks(rdp->update); |
1575 | 6.97k | autodetect_register_server_callbacks(rdp->autodetect); |
1576 | | |
1577 | 6.97k | if (!(context->channelErrorEvent = CreateEvent(NULL, TRUE, FALSE, NULL))) |
1578 | 0 | { |
1579 | 0 | WLog_ERR(TAG, "CreateEvent failed!"); |
1580 | 0 | goto fail; |
1581 | 0 | } |
1582 | | |
1583 | 6.97k | if (!(context->errorDescription = calloc(1, 500))) |
1584 | 0 | { |
1585 | 0 | WLog_ERR(TAG, "calloc failed!"); |
1586 | 0 | goto fail; |
1587 | 0 | } |
1588 | | |
1589 | 6.97k | if (!freerdp_peer_transport_setup(client)) |
1590 | 0 | goto fail; |
1591 | | |
1592 | 6.97k | client->IsWriteBlocked = freerdp_peer_is_write_blocked; |
1593 | 6.97k | client->DrainOutputBuffer = freerdp_peer_drain_output_buffer; |
1594 | 6.97k | client->HasMoreToRead = freerdp_peer_has_more_to_read; |
1595 | 6.97k | client->LicenseCallback = freerdp_peer_nolicense; |
1596 | 6.97k | IFCALLRET(client->ContextNew, ret, client, client->context); |
1597 | | |
1598 | 6.97k | if (!ret) |
1599 | 0 | goto fail; |
1600 | 6.97k | return TRUE; |
1601 | | |
1602 | 0 | fail: |
1603 | 0 | WLog_ERR(TAG, "ContextNew callback failed"); |
1604 | 0 | freerdp_peer_context_free(client); |
1605 | 0 | return FALSE; |
1606 | 6.97k | } |