Coverage Report

Created: 2025-07-01 06:46

/src/FreeRDP/libfreerdp/core/peer.c
Line
Count
Source (jump to first uncovered line)
1
/**
2
 * FreeRDP: A Remote Desktop Protocol Implementation
3
 * RDP Server Peer
4
 *
5
 * Copyright 2011 Vic Lee
6
 * Copyright 2014 DI (FH) Martin Haimberger <martin.haimberger@thincast.com>
7
 * Copyright 2023 Armin Novak <anovak@thincast.com>
8
 * Copyright 2023 Thincast Technologies GmbH
9
 *
10
 * Licensed under the Apache License, Version 2.0 (the "License");
11
 * you may not use this file except in compliance with the License.
12
 * You may obtain a copy of the License at
13
 *
14
 *     http://www.apache.org/licenses/LICENSE-2.0
15
 *
16
 * Unless required by applicable law or agreed to in writing, software
17
 * distributed under the License is distributed on an "AS IS" BASIS,
18
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
19
 * See the License for the specific language governing permissions and
20
 * limitations under the License.
21
 */
22
23
#include <freerdp/config.h>
24
25
#include "settings.h"
26
27
#include <winpr/assert.h>
28
#include <winpr/cast.h>
29
#include <winpr/crt.h>
30
#include <winpr/winsock.h>
31
32
#include "info.h"
33
#include "display.h"
34
35
#include <freerdp/log.h>
36
#include <freerdp/streamdump.h>
37
#include <freerdp/redirection.h>
38
#include <freerdp/crypto/certificate.h>
39
40
#include "rdp.h"
41
#include "peer.h"
42
#include "multitransport.h"
43
44
0
#define TAG FREERDP_TAG("core.peer")
45
46
static state_run_t peer_recv_pdu(freerdp_peer* client, wStream* s);
47
48
static HANDLE freerdp_peer_virtual_channel_open(freerdp_peer* client, const char* name,
49
                                                UINT32 flags)
50
0
{
51
0
  UINT32 index = 0;
52
0
  BOOL joined = FALSE;
53
0
  rdpMcsChannel* mcsChannel = NULL;
54
0
  rdpPeerChannel* peerChannel = NULL;
55
0
  rdpMcs* mcs = NULL;
56
57
0
  WINPR_ASSERT(client);
58
0
  WINPR_ASSERT(client->context);
59
0
  WINPR_ASSERT(client->context->rdp);
60
0
  WINPR_ASSERT(name);
61
0
  mcs = client->context->rdp->mcs;
62
0
  WINPR_ASSERT(mcs);
63
64
0
  if (flags & WTS_CHANNEL_OPTION_DYNAMIC)
65
0
    return NULL; /* not yet supported */
66
67
0
  const size_t length = strnlen(name, 9);
68
69
0
  if (length > 8)
70
0
    return NULL; /* SVC maximum name length is 8 */
71
72
0
  for (; index < mcs->channelCount; index++)
73
0
  {
74
0
    mcsChannel = &(mcs->channels[index]);
75
76
0
    if (!mcsChannel->joined)
77
0
      continue;
78
79
0
    if (_strnicmp(name, mcsChannel->Name, length) == 0)
80
0
    {
81
0
      joined = TRUE;
82
0
      break;
83
0
    }
84
0
  }
85
86
0
  if (!joined)
87
0
    return NULL; /* channel is not joined */
88
89
0
  peerChannel = (rdpPeerChannel*)mcsChannel->handle;
90
91
0
  if (peerChannel)
92
0
  {
93
    /* channel is already open */
94
0
    return (HANDLE)peerChannel;
95
0
  }
96
97
0
  WINPR_ASSERT(index <= UINT16_MAX);
98
0
  peerChannel =
99
0
      server_channel_common_new(client, (UINT16)index, mcsChannel->ChannelId, 128, NULL, name);
100
101
0
  if (peerChannel)
102
0
  {
103
0
    peerChannel->channelFlags = flags;
104
0
    peerChannel->mcsChannel = mcsChannel;
105
0
    mcsChannel->handle = (void*)peerChannel;
106
0
  }
107
108
0
  return (HANDLE)peerChannel;
109
0
}
110
111
static BOOL freerdp_peer_virtual_channel_close(WINPR_ATTR_UNUSED freerdp_peer* client,
112
                                               HANDLE hChannel)
113
0
{
114
0
  rdpMcsChannel* mcsChannel = NULL;
115
0
  rdpPeerChannel* peerChannel = NULL;
116
117
0
  WINPR_ASSERT(client);
118
119
0
  if (!hChannel)
120
0
    return FALSE;
121
122
0
  peerChannel = (rdpPeerChannel*)hChannel;
123
0
  mcsChannel = peerChannel->mcsChannel;
124
0
  WINPR_ASSERT(mcsChannel);
125
0
  mcsChannel->handle = NULL;
126
0
  server_channel_common_free(peerChannel);
127
0
  return TRUE;
128
0
}
129
130
static int freerdp_peer_virtual_channel_write(freerdp_peer* client, HANDLE hChannel,
131
                                              const BYTE* buffer, UINT32 length)
132
0
{
133
0
  wStream* s = NULL;
134
0
  UINT32 flags = 0;
135
0
  UINT32 chunkSize = 0;
136
0
  UINT32 maxChunkSize = 0;
137
0
  UINT32 totalLength = 0;
138
0
  rdpPeerChannel* peerChannel = NULL;
139
0
  rdpMcsChannel* mcsChannel = NULL;
140
0
  rdpRdp* rdp = NULL;
141
142
0
  WINPR_ASSERT(client);
143
0
  WINPR_ASSERT(client->context);
144
145
0
  rdp = client->context->rdp;
146
0
  WINPR_ASSERT(rdp);
147
0
  WINPR_ASSERT(rdp->settings);
148
149
0
  if (!hChannel)
150
0
    return -1;
151
152
0
  peerChannel = (rdpPeerChannel*)hChannel;
153
0
  mcsChannel = peerChannel->mcsChannel;
154
0
  WINPR_ASSERT(peerChannel);
155
0
  WINPR_ASSERT(mcsChannel);
156
0
  if (peerChannel->channelFlags & WTS_CHANNEL_OPTION_DYNAMIC)
157
0
    return -1; /* not yet supported */
158
159
0
  maxChunkSize = rdp->settings->VCChunkSize;
160
0
  totalLength = length;
161
0
  flags = CHANNEL_FLAG_FIRST;
162
163
0
  while (length > 0)
164
0
  {
165
0
    UINT16 sec_flags = 0;
166
0
    s = rdp_send_stream_init(rdp, &sec_flags);
167
168
0
    if (!s)
169
0
      return -1;
170
171
0
    if (length > maxChunkSize)
172
0
    {
173
0
      chunkSize = rdp->settings->VCChunkSize;
174
0
    }
175
0
    else
176
0
    {
177
0
      chunkSize = length;
178
0
      flags |= CHANNEL_FLAG_LAST;
179
0
    }
180
181
0
    if (mcsChannel->options & CHANNEL_OPTION_SHOW_PROTOCOL)
182
0
      flags |= CHANNEL_FLAG_SHOW_PROTOCOL;
183
184
0
    Stream_Write_UINT32(s, totalLength);
185
0
    Stream_Write_UINT32(s, flags);
186
187
0
    if (!Stream_EnsureRemainingCapacity(s, chunkSize))
188
0
    {
189
0
      Stream_Release(s);
190
0
      return -1;
191
0
    }
192
193
0
    Stream_Write(s, buffer, chunkSize);
194
195
0
    WINPR_ASSERT(peerChannel->channelId <= UINT16_MAX);
196
0
    if (!rdp_send(rdp, s, (UINT16)peerChannel->channelId, sec_flags))
197
0
      return -1;
198
199
0
    buffer += chunkSize;
200
0
    length -= chunkSize;
201
0
    flags = 0;
202
0
  }
203
204
0
  return 1;
205
0
}
206
207
static void* freerdp_peer_virtual_channel_get_data(WINPR_ATTR_UNUSED freerdp_peer* client,
208
                                                   HANDLE hChannel)
209
0
{
210
0
  rdpPeerChannel* peerChannel = (rdpPeerChannel*)hChannel;
211
212
0
  WINPR_ASSERT(client);
213
0
  if (!hChannel)
214
0
    return NULL;
215
216
0
  return peerChannel->extra;
217
0
}
218
219
static int freerdp_peer_virtual_channel_set_data(WINPR_ATTR_UNUSED freerdp_peer* client,
220
                                                 HANDLE hChannel, void* data)
221
0
{
222
0
  rdpPeerChannel* peerChannel = (rdpPeerChannel*)hChannel;
223
224
0
  WINPR_ASSERT(client);
225
0
  if (!hChannel)
226
0
    return -1;
227
228
0
  peerChannel->extra = data;
229
0
  return 1;
230
0
}
231
232
static BOOL freerdp_peer_set_state(freerdp_peer* client, CONNECTION_STATE state)
233
0
{
234
0
  WINPR_ASSERT(client);
235
0
  WINPR_ASSERT(client->context);
236
0
  return rdp_server_transition_to_state(client->context->rdp, state);
237
0
}
238
239
static BOOL freerdp_peer_initialize(freerdp_peer* client)
240
0
{
241
0
  rdpRdp* rdp = NULL;
242
0
  rdpSettings* settings = NULL;
243
244
0
  WINPR_ASSERT(client);
245
0
  WINPR_ASSERT(client->context);
246
247
0
  rdp = client->context->rdp;
248
0
  WINPR_ASSERT(rdp);
249
250
0
  settings = rdp->settings;
251
0
  WINPR_ASSERT(settings);
252
253
0
  settings->ServerMode = TRUE;
254
0
  settings->FrameAcknowledge = 0;
255
0
  settings->LocalConnection = client->local;
256
257
0
  const rdpCertificate* cert =
258
0
      freerdp_settings_get_pointer(settings, FreeRDP_RdpServerCertificate);
259
0
  if (!cert)
260
0
  {
261
0
    WLog_ERR(TAG, "Missing server certificate, can not continue.");
262
0
    return FALSE;
263
0
  }
264
265
0
  if (freerdp_settings_get_bool(settings, FreeRDP_RdpSecurity))
266
0
  {
267
268
0
    if (!freerdp_certificate_is_rdp_security_compatible(cert))
269
0
    {
270
0
      if (!freerdp_settings_set_bool(settings, FreeRDP_RdpSecurity, FALSE))
271
0
        return FALSE;
272
0
      if (!freerdp_settings_set_bool(settings, FreeRDP_UseRdpSecurityLayer, FALSE))
273
0
        return FALSE;
274
0
    }
275
0
  }
276
277
0
  nego_set_RCG_supported(rdp->nego, settings->RemoteCredentialGuard);
278
0
  nego_set_restricted_admin_mode_supported(rdp->nego, settings->RestrictedAdminModeSupported);
279
280
0
  if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_INITIAL))
281
0
    return FALSE;
282
283
0
  return TRUE;
284
0
}
285
286
#if defined(WITH_FREERDP_DEPRECATED)
287
static BOOL freerdp_peer_get_fds(freerdp_peer* client, void** rfds, int* rcount)
288
{
289
  rdpTransport* transport = NULL;
290
  WINPR_ASSERT(client);
291
  WINPR_ASSERT(client->context);
292
  WINPR_ASSERT(client->context->rdp);
293
294
  transport = client->context->rdp->transport;
295
  WINPR_ASSERT(transport);
296
  transport_get_fds(transport, rfds, rcount);
297
  return TRUE;
298
}
299
#endif
300
301
static HANDLE freerdp_peer_get_event_handle(freerdp_peer* client)
302
0
{
303
0
  HANDLE hEvent = NULL;
304
0
  rdpTransport* transport = NULL;
305
0
  WINPR_ASSERT(client);
306
0
  WINPR_ASSERT(client->context);
307
0
  WINPR_ASSERT(client->context->rdp);
308
309
0
  transport = client->context->rdp->transport;
310
0
  hEvent = transport_get_front_bio(transport);
311
0
  return hEvent;
312
0
}
313
314
static DWORD freerdp_peer_get_event_handles(freerdp_peer* client, HANDLE* events, DWORD count)
315
0
{
316
0
  WINPR_ASSERT(client);
317
0
  WINPR_ASSERT(client->context);
318
0
  WINPR_ASSERT(client->context->rdp);
319
0
  return transport_get_event_handles(client->context->rdp->transport, events, count);
320
0
}
321
322
static BOOL freerdp_peer_check_fds(freerdp_peer* peer)
323
0
{
324
0
  int status = 0;
325
0
  rdpRdp* rdp = NULL;
326
327
0
  WINPR_ASSERT(peer);
328
0
  WINPR_ASSERT(peer->context);
329
330
0
  rdp = peer->context->rdp;
331
0
  status = rdp_check_fds(rdp);
332
333
0
  if (status < 0)
334
0
    return FALSE;
335
336
0
  return TRUE;
337
0
}
338
339
static state_run_t peer_recv_data_pdu(freerdp_peer* client, wStream* s,
340
                                      WINPR_ATTR_UNUSED UINT16 totalLength)
341
0
{
342
0
  BYTE type = 0;
343
0
  UINT16 length = 0;
344
0
  UINT32 share_id = 0;
345
0
  BYTE compressed_type = 0;
346
0
  UINT16 compressed_len = 0;
347
0
  rdpUpdate* update = NULL;
348
349
0
  WINPR_ASSERT(s);
350
0
  WINPR_ASSERT(client);
351
0
  WINPR_ASSERT(client->context);
352
0
  rdpRdp* rdp = client->context->rdp;
353
0
  WINPR_ASSERT(rdp);
354
0
  WINPR_ASSERT(rdp->mcs);
355
356
0
  update = client->context->update;
357
0
  WINPR_ASSERT(update);
358
359
0
  if (!rdp_read_share_data_header(rdp, s, &length, &type, &share_id, &compressed_type,
360
0
                                  &compressed_len))
361
0
    return STATE_RUN_FAILED;
362
363
#ifdef WITH_DEBUG_RDP
364
  WLog_Print(rdp->log, WLOG_DEBUG, "recv %s Data PDU (0x%02" PRIX8 "), length: %" PRIu16 "",
365
             data_pdu_type_to_string(type), type, length);
366
#endif
367
368
0
  switch (type)
369
0
  {
370
0
    case DATA_PDU_TYPE_SYNCHRONIZE:
371
0
      if (!rdp_recv_client_synchronize_pdu(rdp, s))
372
0
        return STATE_RUN_FAILED;
373
374
0
      break;
375
376
0
    case DATA_PDU_TYPE_CONTROL:
377
0
      if (!rdp_server_accept_client_control_pdu(rdp, s))
378
0
        return STATE_RUN_FAILED;
379
380
0
      break;
381
382
0
    case DATA_PDU_TYPE_INPUT:
383
0
      if (!input_recv(rdp->input, s))
384
0
        return STATE_RUN_FAILED;
385
386
0
      break;
387
388
0
    case DATA_PDU_TYPE_BITMAP_CACHE_PERSISTENT_LIST:
389
0
      if (!rdp_server_accept_client_persistent_key_list_pdu(rdp, s))
390
0
        return STATE_RUN_FAILED;
391
0
      break;
392
393
0
    case DATA_PDU_TYPE_FONT_LIST:
394
0
      if (!rdp_server_accept_client_font_list_pdu(rdp, s))
395
0
        return STATE_RUN_FAILED;
396
397
0
      return STATE_RUN_CONTINUE; // State changed, trigger rerun
398
399
0
    case DATA_PDU_TYPE_SHUTDOWN_REQUEST:
400
0
      mcs_send_disconnect_provider_ultimatum(rdp->mcs,
401
0
                                             Disconnect_Ultimatum_provider_initiated);
402
0
      WLog_WARN(TAG, "disconnect provider ultimatum sent to peer, closing connection");
403
0
      return STATE_RUN_QUIT_SESSION;
404
405
0
    case DATA_PDU_TYPE_FRAME_ACKNOWLEDGE:
406
0
      if (!Stream_CheckAndLogRequiredLength(TAG, s, 4))
407
0
        return STATE_RUN_FAILED;
408
409
0
      Stream_Read_UINT32(s, client->ack_frame_id);
410
0
      IFCALL(update->SurfaceFrameAcknowledge, update->context, client->ack_frame_id);
411
0
      break;
412
413
0
    case DATA_PDU_TYPE_REFRESH_RECT:
414
0
      if (!update_read_refresh_rect(update, s))
415
0
        return STATE_RUN_FAILED;
416
417
0
      break;
418
419
0
    case DATA_PDU_TYPE_SUPPRESS_OUTPUT:
420
0
      if (!update_read_suppress_output(update, s))
421
0
        return STATE_RUN_FAILED;
422
423
0
      break;
424
425
0
    default:
426
0
      WLog_ERR(TAG, "Data PDU type %" PRIu8 "", type);
427
0
      break;
428
0
  }
429
430
0
  return STATE_RUN_SUCCESS;
431
0
}
432
433
static state_run_t peer_recv_tpkt_pdu(freerdp_peer* client, wStream* s)
434
0
{
435
0
  state_run_t rc = STATE_RUN_SUCCESS;
436
0
  UINT16 length = 0;
437
0
  UINT16 pduType = 0;
438
0
  UINT16 pduSource = 0;
439
0
  UINT16 channelId = 0;
440
0
  UINT16 securityFlags = 0;
441
442
0
  WINPR_ASSERT(s);
443
0
  WINPR_ASSERT(client);
444
0
  WINPR_ASSERT(client->context);
445
446
0
  rdpRdp* rdp = client->context->rdp;
447
0
  WINPR_ASSERT(rdp);
448
0
  WINPR_ASSERT(rdp->mcs);
449
450
0
  rdpSettings* settings = client->context->settings;
451
0
  WINPR_ASSERT(settings);
452
453
0
  if (!rdp_read_header(rdp, s, &length, &channelId))
454
0
    return STATE_RUN_FAILED;
455
456
0
  rdp->inPackets++;
457
0
  if (freerdp_shall_disconnect_context(rdp->context))
458
0
    return STATE_RUN_SUCCESS;
459
460
0
  if (rdp_get_state(rdp) <= CONNECTION_STATE_LICENSING)
461
0
  {
462
0
    return rdp_handle_message_channel(rdp, s, channelId, length);
463
0
  }
464
465
0
  if (!rdp_handle_optional_rdp_decryption(rdp, s, &length, &securityFlags))
466
0
    return STATE_RUN_FAILED;
467
468
0
  if (channelId == MCS_GLOBAL_CHANNEL_ID)
469
0
  {
470
0
    char buffer[256] = { 0 };
471
0
    UINT16 pduLength = 0;
472
0
    UINT16 remain = 0;
473
0
    if (!rdp_read_share_control_header(rdp, s, &pduLength, &remain, &pduType, &pduSource))
474
0
      return STATE_RUN_FAILED;
475
476
0
    settings->PduSource = pduSource;
477
478
0
    WLog_DBG(TAG, "Received %s", pdu_type_to_str(pduType, buffer, sizeof(buffer)));
479
0
    switch (pduType)
480
0
    {
481
0
      case PDU_TYPE_DATA:
482
0
        rc = peer_recv_data_pdu(client, s, pduLength);
483
0
        break;
484
485
0
      case PDU_TYPE_CONFIRM_ACTIVE:
486
0
        if (!rdp_server_accept_confirm_active(rdp, s, pduLength))
487
0
          return STATE_RUN_FAILED;
488
489
0
        break;
490
491
0
      case PDU_TYPE_FLOW_RESPONSE:
492
0
      case PDU_TYPE_FLOW_STOP:
493
0
      case PDU_TYPE_FLOW_TEST:
494
0
        if (!Stream_SafeSeek(s, remain))
495
0
        {
496
0
          WLog_WARN(TAG, "Short PDU, need %" PRIuz " bytes, got %" PRIuz, remain,
497
0
                    Stream_GetRemainingLength(s));
498
0
          return STATE_RUN_FAILED;
499
0
        }
500
0
        break;
501
502
0
      default:
503
0
        WLog_ERR(TAG, "Client sent unknown pduType %" PRIu16 "", pduType);
504
0
        return STATE_RUN_FAILED;
505
0
    }
506
0
  }
507
0
  else if ((rdp->mcs->messageChannelId > 0) && (channelId == rdp->mcs->messageChannelId))
508
0
  {
509
0
    if (!settings->UseRdpSecurityLayer)
510
0
    {
511
0
      if (!rdp_read_security_header(rdp, s, &securityFlags, NULL))
512
0
        return STATE_RUN_FAILED;
513
0
    }
514
515
0
    return rdp_recv_message_channel_pdu(rdp, s, securityFlags);
516
0
  }
517
0
  else
518
0
  {
519
0
    if (!freerdp_channel_peer_process(client, s, channelId))
520
0
      return STATE_RUN_FAILED;
521
0
  }
522
0
  if (!tpkt_ensure_stream_consumed(rdp->log, s, length))
523
0
    return STATE_RUN_FAILED;
524
525
0
  return rc;
526
0
}
527
528
static state_run_t peer_recv_handle_auto_detect(freerdp_peer* client, wStream* s)
529
0
{
530
0
  state_run_t ret = STATE_RUN_FAILED;
531
0
  rdpRdp* rdp = NULL;
532
533
0
  WINPR_ASSERT(client);
534
0
  WINPR_ASSERT(s);
535
0
  WINPR_ASSERT(client->context);
536
537
0
  rdp = client->context->rdp;
538
0
  WINPR_ASSERT(rdp);
539
540
0
  const rdpSettings* settings = client->context->settings;
541
0
  WINPR_ASSERT(settings);
542
543
0
  if (freerdp_settings_get_bool(settings, FreeRDP_NetworkAutoDetect))
544
0
  {
545
0
    switch (rdp_get_state(rdp))
546
0
    {
547
0
      case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_REQUEST:
548
0
        autodetect_on_connect_time_auto_detect_begin(rdp->autodetect);
549
0
        switch (autodetect_get_state(rdp->autodetect))
550
0
        {
551
0
          case FREERDP_AUTODETECT_STATE_REQUEST:
552
0
            ret = STATE_RUN_SUCCESS;
553
0
            if (!rdp_server_transition_to_state(
554
0
                    rdp, CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_RESPONSE))
555
0
              return STATE_RUN_FAILED;
556
0
            break;
557
0
          case FREERDP_AUTODETECT_STATE_COMPLETE:
558
0
            ret = STATE_RUN_CONTINUE; /* Rerun in next state */
559
0
            if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_LICENSING))
560
0
              return STATE_RUN_FAILED;
561
0
            break;
562
0
          default:
563
0
            break;
564
0
        }
565
0
        break;
566
0
      case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_RESPONSE:
567
0
        ret = peer_recv_pdu(client, s);
568
0
        if (state_run_success(ret))
569
0
        {
570
0
          autodetect_on_connect_time_auto_detect_progress(rdp->autodetect);
571
0
          switch (autodetect_get_state(rdp->autodetect))
572
0
          {
573
0
            case FREERDP_AUTODETECT_STATE_REQUEST:
574
0
              ret = STATE_RUN_SUCCESS;
575
0
              break;
576
0
            case FREERDP_AUTODETECT_STATE_COMPLETE:
577
0
              ret = STATE_RUN_CONTINUE; /* Rerun in next state */
578
0
              if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_LICENSING))
579
0
                return STATE_RUN_FAILED;
580
0
              break;
581
0
            default:
582
0
              break;
583
0
          }
584
0
        }
585
0
        break;
586
0
      default:
587
0
        WINPR_ASSERT(FALSE);
588
0
        break;
589
0
    }
590
0
  }
591
0
  else
592
0
  {
593
0
    if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_LICENSING))
594
0
      return STATE_RUN_FAILED;
595
596
0
    ret = STATE_RUN_CONTINUE; /* Rerun in next state */
597
0
  }
598
599
0
  return ret;
600
0
}
601
602
static state_run_t peer_recv_handle_licensing(freerdp_peer* client, wStream* s)
603
0
{
604
0
  state_run_t ret = STATE_RUN_FAILED;
605
0
  rdpRdp* rdp = NULL;
606
0
  rdpSettings* settings = NULL;
607
608
0
  WINPR_ASSERT(client);
609
0
  WINPR_ASSERT(s);
610
0
  WINPR_ASSERT(client->context);
611
612
0
  rdp = client->context->rdp;
613
0
  WINPR_ASSERT(rdp);
614
615
0
  settings = rdp->settings;
616
0
  WINPR_ASSERT(settings);
617
618
0
  switch (license_get_state(rdp->license))
619
0
  {
620
0
    case LICENSE_STATE_INITIAL:
621
0
    {
622
0
      const BOOL required =
623
0
          freerdp_settings_get_bool(settings, FreeRDP_ServerLicenseRequired);
624
625
0
      if (required)
626
0
      {
627
0
        if (!license_server_configure(rdp->license))
628
0
          ret = STATE_RUN_FAILED;
629
0
        else if (!license_server_send_request(rdp->license))
630
0
          ret = STATE_RUN_FAILED;
631
0
        else
632
0
          ret = STATE_RUN_SUCCESS;
633
0
      }
634
0
      else
635
0
      {
636
0
        if (license_send_valid_client_error_packet(rdp))
637
0
          ret = STATE_RUN_CONTINUE; /* Rerun in next state, might be capabilities */
638
0
      }
639
0
    }
640
0
    break;
641
0
    case LICENSE_STATE_COMPLETED:
642
0
      ret = STATE_RUN_CONTINUE; /* Licensing completed, continue in next state */
643
0
      break;
644
0
    case LICENSE_STATE_ABORTED:
645
0
      ret = STATE_RUN_FAILED;
646
0
      break;
647
0
    default:
648
0
      ret = peer_recv_pdu(client, s);
649
0
      break;
650
0
  }
651
652
0
  return ret;
653
0
}
654
655
static state_run_t peer_recv_fastpath_pdu(freerdp_peer* client, wStream* s)
656
0
{
657
0
  rdpRdp* rdp = NULL;
658
0
  UINT16 length = 0;
659
0
  BOOL rc = 0;
660
0
  rdpFastPath* fastpath = NULL;
661
662
0
  WINPR_ASSERT(s);
663
0
  WINPR_ASSERT(client);
664
0
  WINPR_ASSERT(client->context);
665
666
0
  rdp = client->context->rdp;
667
0
  WINPR_ASSERT(rdp);
668
669
0
  fastpath = rdp->fastpath;
670
0
  WINPR_ASSERT(fastpath);
671
672
0
  rc = fastpath_read_header_rdp(fastpath, s, &length);
673
674
0
  if (!rc || (length == 0))
675
0
  {
676
0
    WLog_ERR(TAG, "incorrect FastPath PDU header length %" PRIu16 "", length);
677
0
    return STATE_RUN_FAILED;
678
0
  }
679
0
  if (!Stream_CheckAndLogRequiredLength(TAG, s, length))
680
0
    return STATE_RUN_FAILED;
681
682
0
  if (!fastpath_decrypt(fastpath, s, &length))
683
0
    return STATE_RUN_FAILED;
684
685
0
  rdp->inPackets++;
686
687
0
  return fastpath_recv_inputs(fastpath, s);
688
0
}
689
690
state_run_t peer_recv_pdu(freerdp_peer* client, wStream* s)
691
0
{
692
0
  int rc = tpkt_verify_header(s);
693
694
0
  if (rc > 0)
695
0
    return peer_recv_tpkt_pdu(client, s);
696
0
  else if (rc == 0)
697
0
    return peer_recv_fastpath_pdu(client, s);
698
0
  else
699
0
    return STATE_RUN_FAILED;
700
0
}
701
702
static state_run_t peer_unexpected_client_message(rdpRdp* rdp, UINT32 flag)
703
0
{
704
0
  char buffer[1024] = { 0 };
705
0
  WLog_WARN(TAG, "Unexpected client message in state %s, missing flag %s",
706
0
            rdp_get_state_string(rdp), rdp_finalize_flags_to_str(flag, buffer, sizeof(buffer)));
707
0
  return STATE_RUN_SUCCESS; /* we ignore this as per spec input PDU are already allowed */
708
0
}
709
710
state_run_t rdp_peer_handle_state_demand_active(freerdp_peer* client)
711
0
{
712
0
  state_run_t ret = STATE_RUN_FAILED;
713
714
0
  WINPR_ASSERT(client);
715
0
  WINPR_ASSERT(client->context);
716
717
0
  rdpRdp* rdp = client->context->rdp;
718
0
  WINPR_ASSERT(rdp);
719
720
0
  if (client->Capabilities && !client->Capabilities(client))
721
0
  {
722
0
    WLog_ERR(TAG, "[%s] freerdp_peer::Capabilities() callback failed",
723
0
             rdp_get_state_string(rdp));
724
0
  }
725
0
  else if (!rdp_send_demand_active(rdp))
726
0
  {
727
0
    WLog_ERR(TAG, "[%s] rdp_send_demand_active() fail", rdp_get_state_string(rdp));
728
0
  }
729
0
  else
730
0
  {
731
0
    if (!rdp_server_transition_to_state(rdp,
732
0
                                        CONNECTION_STATE_CAPABILITIES_EXCHANGE_MONITOR_LAYOUT))
733
0
      return STATE_RUN_FAILED;
734
0
    ret = STATE_RUN_CONTINUE;
735
0
  }
736
0
  return ret;
737
0
}
738
739
/** \brief Handle server peer state ACTIVE:
740
 *  On initial run (not connected, not activated) do not read data
741
 *
742
 *  \return -1 in case of an error, 0 if no data needs to be processed, 1 to let
743
 *  the state machine run again and 2 if peer_recv_pdu must be called.
744
 */
745
static state_run_t rdp_peer_handle_state_active(freerdp_peer* client)
746
0
{
747
0
  state_run_t ret = STATE_RUN_FAILED;
748
749
0
  WINPR_ASSERT(client);
750
0
  WINPR_ASSERT(client->context);
751
752
0
  if (!client->connected)
753
0
  {
754
    /**
755
     * PostConnect should only be called once and should not
756
     * be called after a reactivation sequence.
757
     */
758
0
    IFCALLRET(client->PostConnect, client->connected, client);
759
0
  }
760
0
  if (!client->connected)
761
0
  {
762
0
    WLog_ERR(TAG, "PostConnect for peer %p failed", client);
763
0
    ret = STATE_RUN_FAILED;
764
0
  }
765
0
  else if (!client->activated)
766
0
  {
767
0
    BOOL activated = TRUE;
768
769
    /*  Set client->activated TRUE before calling the Activate callback.
770
     *  the Activate callback might reset the client->activated flag even if it returns success
771
     * (e.g. deactivate/reactivate sequence) */
772
0
    client->activated = TRUE;
773
0
    IFCALLRET(client->Activate, activated, client);
774
775
0
    if (!activated)
776
0
    {
777
0
      WLog_ERR(TAG, "Activate for peer %p failed", client);
778
0
      ret = STATE_RUN_FAILED;
779
0
    }
780
0
    else
781
0
      ret = STATE_RUN_SUCCESS;
782
0
  }
783
0
  else
784
0
    ret = STATE_RUN_ACTIVE;
785
0
  return ret;
786
0
}
787
788
static state_run_t peer_recv_callback_internal(WINPR_ATTR_UNUSED rdpTransport* transport,
789
                                               wStream* s, void* extra)
790
0
{
791
0
  UINT32 SelectedProtocol = 0;
792
0
  freerdp_peer* client = (freerdp_peer*)extra;
793
0
  rdpRdp* rdp = NULL;
794
0
  state_run_t ret = STATE_RUN_FAILED;
795
0
  rdpSettings* settings = NULL;
796
797
0
  WINPR_ASSERT(transport);
798
0
  WINPR_ASSERT(client);
799
0
  WINPR_ASSERT(client->context);
800
801
0
  rdp = client->context->rdp;
802
0
  WINPR_ASSERT(rdp);
803
804
0
  settings = client->context->settings;
805
0
  WINPR_ASSERT(settings);
806
807
0
  IFCALL(client->ReachedState, client, rdp_get_state(rdp));
808
0
  switch (rdp_get_state(rdp))
809
0
  {
810
0
    case CONNECTION_STATE_INITIAL:
811
0
      if (!freerdp_settings_enforce_consistency(settings))
812
0
        ret = STATE_RUN_FAILED;
813
0
      else if (rdp_server_transition_to_state(rdp, CONNECTION_STATE_NEGO))
814
0
        ret = STATE_RUN_CONTINUE;
815
0
      break;
816
817
0
    case CONNECTION_STATE_NEGO:
818
0
      if (!rdp_server_accept_nego(rdp, s))
819
0
      {
820
0
        WLog_ERR(TAG, "%s - rdp_server_accept_nego() fail", rdp_get_state_string(rdp));
821
0
      }
822
0
      else
823
0
      {
824
0
        SelectedProtocol = nego_get_selected_protocol(rdp->nego);
825
0
        settings->RdstlsSecurity = (SelectedProtocol & PROTOCOL_RDSTLS) ? TRUE : FALSE;
826
0
        settings->NlaSecurity = (SelectedProtocol & PROTOCOL_HYBRID) ? TRUE : FALSE;
827
0
        settings->TlsSecurity = (SelectedProtocol & PROTOCOL_SSL) ? TRUE : FALSE;
828
0
        settings->RdpSecurity = (SelectedProtocol == PROTOCOL_RDP) ? TRUE : FALSE;
829
830
0
        if (SelectedProtocol & PROTOCOL_HYBRID)
831
0
        {
832
0
          SEC_WINNT_AUTH_IDENTITY_INFO* identity =
833
0
              (SEC_WINNT_AUTH_IDENTITY_INFO*)nego_get_identity(rdp->nego);
834
0
          sspi_CopyAuthIdentity(&client->identity, identity);
835
0
          IFCALLRET(client->Logon, client->authenticated, client, &client->identity,
836
0
                    TRUE);
837
0
          nego_free_nla(rdp->nego);
838
0
        }
839
0
        else
840
0
        {
841
0
          IFCALLRET(client->Logon, client->authenticated, client, &client->identity,
842
0
                    FALSE);
843
0
        }
844
0
        if (rdp_server_transition_to_state(rdp, CONNECTION_STATE_MCS_CREATE_REQUEST))
845
0
          ret = STATE_RUN_SUCCESS;
846
0
      }
847
0
      break;
848
849
0
    case CONNECTION_STATE_NLA:
850
0
      WINPR_ASSERT(FALSE); // TODO
851
0
      break;
852
853
0
    case CONNECTION_STATE_MCS_CREATE_REQUEST:
854
0
      if (!rdp_server_accept_mcs_connect_initial(rdp, s))
855
0
      {
856
0
        WLog_ERR(TAG,
857
0
                 "%s - "
858
0
                 "rdp_server_accept_mcs_connect_initial() fail",
859
0
                 rdp_get_state_string(rdp));
860
0
      }
861
0
      else
862
0
        ret = STATE_RUN_SUCCESS;
863
864
0
      break;
865
866
0
    case CONNECTION_STATE_MCS_ERECT_DOMAIN:
867
0
      if (!rdp_server_accept_mcs_erect_domain_request(rdp, s))
868
0
      {
869
0
        WLog_ERR(TAG,
870
0
                 "%s - "
871
0
                 "rdp_server_accept_mcs_erect_domain_request() fail",
872
0
                 rdp_get_state_string(rdp));
873
0
      }
874
0
      else
875
0
        ret = STATE_RUN_SUCCESS;
876
877
0
      break;
878
879
0
    case CONNECTION_STATE_MCS_ATTACH_USER:
880
0
      if (!rdp_server_accept_mcs_attach_user_request(rdp, s))
881
0
      {
882
0
        WLog_ERR(TAG,
883
0
                 "%s - "
884
0
                 "rdp_server_accept_mcs_attach_user_request() fail",
885
0
                 rdp_get_state_string(rdp));
886
0
      }
887
0
      else
888
0
        ret = STATE_RUN_SUCCESS;
889
890
0
      break;
891
892
0
    case CONNECTION_STATE_MCS_CHANNEL_JOIN_REQUEST:
893
0
      if (!rdp_server_accept_mcs_channel_join_request(rdp, s))
894
0
      {
895
0
        WLog_ERR(TAG,
896
0
                 "%s - "
897
0
                 "rdp_server_accept_mcs_channel_join_request() fail",
898
0
                 rdp_get_state_string(rdp));
899
0
      }
900
0
      else
901
0
        ret = STATE_RUN_SUCCESS;
902
0
      break;
903
904
0
    case CONNECTION_STATE_RDP_SECURITY_COMMENCEMENT:
905
0
      ret = STATE_RUN_SUCCESS;
906
907
0
      if (!rdp_server_establish_keys(rdp, s))
908
0
      {
909
0
        WLog_ERR(TAG,
910
0
                 "%s - "
911
0
                 "rdp_server_establish_keys() fail",
912
0
                 rdp_get_state_string(rdp));
913
0
        ret = STATE_RUN_FAILED;
914
0
      }
915
916
0
      if (state_run_success(ret))
917
0
      {
918
0
        if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_SECURE_SETTINGS_EXCHANGE))
919
0
          ret = STATE_RUN_FAILED;
920
0
        else if (Stream_GetRemainingLength(s) > 0)
921
0
          ret = STATE_RUN_CONTINUE; /* Rerun function */
922
0
      }
923
0
      break;
924
925
0
    case CONNECTION_STATE_SECURE_SETTINGS_EXCHANGE:
926
0
      if (rdp_recv_client_info(rdp, s))
927
0
      {
928
0
        if (rdp_server_transition_to_state(
929
0
                rdp, CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_REQUEST))
930
0
          ret = STATE_RUN_CONTINUE;
931
0
      }
932
0
      break;
933
934
0
    case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_REQUEST:
935
0
    case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_RESPONSE:
936
0
      ret = peer_recv_handle_auto_detect(client, s);
937
0
      break;
938
939
0
    case CONNECTION_STATE_LICENSING:
940
0
      ret = peer_recv_handle_licensing(client, s);
941
0
      if (ret == STATE_RUN_CONTINUE)
942
0
      {
943
0
        if (!rdp_server_transition_to_state(
944
0
                rdp, CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_REQUEST))
945
0
          ret = STATE_RUN_FAILED;
946
0
      }
947
0
      break;
948
949
0
    case CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_REQUEST:
950
0
      if (settings->SupportMultitransport &&
951
0
          ((settings->MultitransportFlags & INITIATE_REQUEST_PROTOCOL_UDPFECR) != 0))
952
0
      {
953
        /* only UDP reliable for now, nobody does lossy UDP (MS-RDPUDP only) these days */
954
0
        ret = multitransport_server_request(rdp->multitransport,
955
0
                                            INITIATE_REQUEST_PROTOCOL_UDPFECR);
956
0
        switch (ret)
957
0
        {
958
0
          case STATE_RUN_SUCCESS:
959
0
            rdp_server_transition_to_state(
960
0
                rdp, CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_RESPONSE);
961
0
            break;
962
0
          case STATE_RUN_CONTINUE:
963
            /* mismatch on the supported kind of UDP transports */
964
0
            rdp_server_transition_to_state(
965
0
                rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE);
966
0
            break;
967
0
          default:
968
0
            break;
969
0
        }
970
0
      }
971
0
      else
972
0
      {
973
0
        if (rdp_server_transition_to_state(
974
0
                rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE))
975
0
          ret = STATE_RUN_CONTINUE; /* Rerun, initialize next state */
976
0
      }
977
0
      break;
978
0
    case CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_RESPONSE:
979
0
      ret = peer_recv_pdu(client, s);
980
0
      break;
981
982
0
    case CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE:
983
0
      ret = rdp_peer_handle_state_demand_active(client);
984
0
      break;
985
986
0
    case CONNECTION_STATE_CAPABILITIES_EXCHANGE_MONITOR_LAYOUT:
987
0
      if (freerdp_settings_get_bool(settings, FreeRDP_SupportMonitorLayoutPdu))
988
0
      {
989
0
        MONITOR_DEF* monitors = NULL;
990
991
0
        IFCALL(client->AdjustMonitorsLayout, client);
992
993
        /* client supports the monitorLayout PDU, let's send him the monitors if any */
994
0
        ret = STATE_RUN_SUCCESS;
995
0
        if (freerdp_settings_get_uint32(settings, FreeRDP_MonitorCount) == 0)
996
0
        {
997
0
          const UINT32 w = freerdp_settings_get_uint32(settings, FreeRDP_DesktopWidth);
998
0
          const UINT32 h = freerdp_settings_get_uint32(settings, FreeRDP_DesktopHeight);
999
0
          const rdpMonitor primary = { .x = 0,
1000
0
                                     .y = 0,
1001
0
                                     .width = WINPR_ASSERTING_INT_CAST(int32_t, w),
1002
0
                                     .height = WINPR_ASSERTING_INT_CAST(int32_t, h),
1003
0
                                     .is_primary = TRUE,
1004
0
                                     .orig_screen = 0,
1005
0
                                     .attributes = { .physicalWidth = w,
1006
0
                                                     .physicalHeight = h,
1007
0
                                                     .orientation =
1008
0
                                                         ORIENTATION_LANDSCAPE,
1009
0
                                                     .desktopScaleFactor = 100,
1010
0
                                                     .deviceScaleFactor = 100 } };
1011
0
          if (!freerdp_settings_set_pointer_array(settings, FreeRDP_MonitorDefArray, 0,
1012
0
                                                  &primary))
1013
0
            ret = STATE_RUN_FAILED;
1014
0
          else if (!freerdp_settings_set_uint32(settings, FreeRDP_MonitorCount, 1))
1015
0
            ret = STATE_RUN_FAILED;
1016
0
        }
1017
0
        if (state_run_failed(ret))
1018
0
        {
1019
0
        }
1020
0
        else if (!display_convert_rdp_monitor_to_monitor_def(
1021
0
                     settings->MonitorCount, settings->MonitorDefArray, &monitors))
1022
0
        {
1023
0
          ret = STATE_RUN_FAILED;
1024
0
        }
1025
0
        else if (!freerdp_display_send_monitor_layout(rdp->context, settings->MonitorCount,
1026
0
                                                      monitors))
1027
0
        {
1028
0
          ret = STATE_RUN_FAILED;
1029
0
        }
1030
0
        else
1031
0
          ret = STATE_RUN_SUCCESS;
1032
0
        free(monitors);
1033
1034
0
        const size_t len = Stream_GetRemainingLength(s);
1035
0
        if (!state_run_failed(ret) && (len > 0))
1036
0
          ret = STATE_RUN_CONTINUE;
1037
0
      }
1038
0
      else
1039
0
      {
1040
0
        const size_t len = Stream_GetRemainingLength(s);
1041
0
        if (len > 0)
1042
0
          ret = STATE_RUN_CONTINUE;
1043
0
        else
1044
0
          ret = STATE_RUN_SUCCESS;
1045
0
      }
1046
0
      if (state_run_success(ret))
1047
0
      {
1048
0
        if (!rdp_server_transition_to_state(
1049
0
                rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE_CONFIRM_ACTIVE))
1050
0
          ret = STATE_RUN_FAILED;
1051
0
      }
1052
0
      break;
1053
1054
0
    case CONNECTION_STATE_CAPABILITIES_EXCHANGE_CONFIRM_ACTIVE:
1055
      /**
1056
       * During reactivation sequence the client might sent some input or channel data
1057
       * before receiving the Deactivate All PDU. We need to process them as usual.
1058
       */
1059
0
      ret = peer_recv_pdu(client, s);
1060
0
      break;
1061
1062
0
    case CONNECTION_STATE_FINALIZATION_SYNC:
1063
0
      ret = peer_recv_pdu(client, s);
1064
0
      if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_SYNCHRONIZE_PDU))
1065
0
      {
1066
0
        if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_FINALIZATION_COOPERATE))
1067
0
          ret = STATE_RUN_FAILED;
1068
0
      }
1069
0
      else
1070
0
        ret = peer_unexpected_client_message(rdp, FINALIZE_CS_SYNCHRONIZE_PDU);
1071
0
      break;
1072
0
    case CONNECTION_STATE_FINALIZATION_COOPERATE:
1073
0
      ret = peer_recv_pdu(client, s);
1074
0
      if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_CONTROL_COOPERATE_PDU))
1075
0
      {
1076
0
        if (!rdp_server_transition_to_state(rdp,
1077
0
                                            CONNECTION_STATE_FINALIZATION_REQUEST_CONTROL))
1078
0
          ret = STATE_RUN_FAILED;
1079
0
      }
1080
0
      else
1081
0
        ret = peer_unexpected_client_message(rdp, FINALIZE_CS_CONTROL_COOPERATE_PDU);
1082
0
      break;
1083
0
    case CONNECTION_STATE_FINALIZATION_REQUEST_CONTROL:
1084
0
      ret = peer_recv_pdu(client, s);
1085
0
      if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_CONTROL_REQUEST_PDU))
1086
0
      {
1087
0
        if (!rdp_send_server_control_granted_pdu(rdp))
1088
0
          ret = STATE_RUN_FAILED;
1089
0
        else if (!rdp_server_transition_to_state(
1090
0
                     rdp, CONNECTION_STATE_FINALIZATION_PERSISTENT_KEY_LIST))
1091
0
          ret = STATE_RUN_FAILED;
1092
0
      }
1093
0
      else
1094
0
        ret = peer_unexpected_client_message(rdp, FINALIZE_CS_CONTROL_REQUEST_PDU);
1095
0
      break;
1096
0
    case CONNECTION_STATE_FINALIZATION_PERSISTENT_KEY_LIST:
1097
0
      if (freerdp_settings_get_bool(settings, FreeRDP_BitmapCachePersistEnabled) &&
1098
0
          !rdp_finalize_is_flag_set(rdp, FINALIZE_DEACTIVATE_REACTIVATE))
1099
0
      {
1100
0
        ret = peer_recv_pdu(client, s);
1101
1102
0
        if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_PERSISTENT_KEY_LIST_PDU))
1103
0
        {
1104
0
          if (!rdp_server_transition_to_state(rdp,
1105
0
                                              CONNECTION_STATE_FINALIZATION_FONT_LIST))
1106
0
            ret = STATE_RUN_FAILED;
1107
0
        }
1108
0
        else
1109
0
          ret = peer_unexpected_client_message(rdp,
1110
0
                                               CONNECTION_STATE_FINALIZATION_FONT_LIST);
1111
0
      }
1112
0
      else
1113
0
      {
1114
0
        if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_FINALIZATION_FONT_LIST))
1115
0
          ret = STATE_RUN_FAILED;
1116
0
        else
1117
0
          ret = STATE_RUN_CONTINUE;
1118
0
      }
1119
0
      break;
1120
0
    case CONNECTION_STATE_FINALIZATION_FONT_LIST:
1121
0
      ret = peer_recv_pdu(client, s);
1122
0
      if (state_run_success(ret))
1123
0
      {
1124
0
        if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_FONT_LIST_PDU))
1125
0
        {
1126
0
          if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_ACTIVE))
1127
0
            ret = STATE_RUN_FAILED;
1128
0
          else
1129
0
          {
1130
0
            update_reset_state(rdp->update);
1131
0
            ret = STATE_RUN_CONTINUE;
1132
0
          }
1133
0
        }
1134
0
        else
1135
0
          ret = peer_unexpected_client_message(rdp, FINALIZE_CS_FONT_LIST_PDU);
1136
0
      }
1137
0
      break;
1138
1139
0
    case CONNECTION_STATE_ACTIVE:
1140
0
      ret = rdp_peer_handle_state_active(client);
1141
0
      if (ret >= STATE_RUN_ACTIVE)
1142
0
        ret = peer_recv_pdu(client, s);
1143
0
      break;
1144
1145
      /* States that must not happen in server state machine */
1146
0
    case CONNECTION_STATE_FINALIZATION_CLIENT_SYNC:
1147
0
    case CONNECTION_STATE_FINALIZATION_CLIENT_COOPERATE:
1148
0
    case CONNECTION_STATE_FINALIZATION_CLIENT_GRANTED_CONTROL:
1149
0
    case CONNECTION_STATE_FINALIZATION_CLIENT_FONT_MAP:
1150
0
    default:
1151
0
      WLog_ERR(TAG, "%s state %d", rdp_get_state_string(rdp), rdp_get_state(rdp));
1152
0
      break;
1153
0
  }
1154
1155
0
  return ret;
1156
0
}
1157
1158
static state_run_t peer_recv_callback(rdpTransport* transport, wStream* s, void* extra)
1159
0
{
1160
0
  char buffer[64] = { 0 };
1161
0
  state_run_t rc = STATE_RUN_FAILED;
1162
0
  const size_t start = Stream_GetPosition(s);
1163
0
  const rdpContext* context = transport_get_context(transport);
1164
0
  DWORD level = WLOG_TRACE;
1165
0
  static wLog* log = NULL;
1166
0
  if (!log)
1167
0
    log = WLog_Get(TAG);
1168
1169
0
  WINPR_ASSERT(context);
1170
0
  do
1171
0
  {
1172
0
    const rdpRdp* rdp = context->rdp;
1173
0
    const char* old = rdp_get_state_string(rdp);
1174
1175
0
    if (rc == STATE_RUN_TRY_AGAIN)
1176
0
      Stream_SetPosition(s, start);
1177
0
    rc = peer_recv_callback_internal(transport, s, extra);
1178
1179
0
    const size_t len = Stream_GetRemainingLength(s);
1180
0
    if ((len > 0) && !state_run_continue(rc))
1181
0
      level = WLOG_WARN;
1182
0
    WLog_Print(log, level,
1183
0
               "(server)[%s -> %s] current return %s [%" PRIuz " bytes not processed]", old,
1184
0
               rdp_get_state_string(rdp), state_run_result_string(rc, buffer, sizeof(buffer)),
1185
0
               len);
1186
0
  } while (state_run_continue(rc));
1187
1188
0
  return rc;
1189
0
}
1190
1191
static BOOL freerdp_peer_close(freerdp_peer* client)
1192
0
{
1193
0
  UINT32 SelectedProtocol = 0;
1194
0
  rdpContext* context = NULL;
1195
1196
0
  WINPR_ASSERT(client);
1197
1198
0
  context = client->context;
1199
0
  WINPR_ASSERT(context);
1200
0
  WINPR_ASSERT(context->settings);
1201
0
  WINPR_ASSERT(context->rdp);
1202
1203
  /** if negotiation has failed, we're not MCS connected. So don't
1204
   *  send anything else, or some mstsc will consider that as an error
1205
   */
1206
0
  SelectedProtocol = nego_get_selected_protocol(context->rdp->nego);
1207
1208
0
  if (SelectedProtocol & PROTOCOL_FAILED_NEGO)
1209
0
    return TRUE;
1210
1211
  /**
1212
   * [MS-RDPBCGR] 1.3.1.4.2 User-Initiated Disconnection Sequence on Server
1213
   * The server first sends the client a Deactivate All PDU followed by an
1214
   * optional MCS Disconnect Provider Ultimatum PDU.
1215
   */
1216
0
  if (!rdp_send_deactivate_all(context->rdp))
1217
0
    return FALSE;
1218
1219
0
  if (freerdp_settings_get_bool(context->settings, FreeRDP_SupportErrorInfoPdu))
1220
0
  {
1221
0
    rdp_send_error_info(context->rdp);
1222
0
  }
1223
1224
0
  return mcs_send_disconnect_provider_ultimatum(context->rdp->mcs,
1225
0
                                                Disconnect_Ultimatum_provider_initiated);
1226
0
}
1227
1228
static void freerdp_peer_disconnect(freerdp_peer* client)
1229
0
{
1230
0
  rdpTransport* transport = NULL;
1231
0
  WINPR_ASSERT(client);
1232
1233
0
  transport = freerdp_get_transport(client->context);
1234
0
  transport_disconnect(transport);
1235
0
}
1236
1237
static BOOL freerdp_peer_send_channel_data(freerdp_peer* client, UINT16 channelId, const BYTE* data,
1238
                                           size_t size)
1239
0
{
1240
0
  WINPR_ASSERT(client);
1241
0
  WINPR_ASSERT(client->context);
1242
0
  WINPR_ASSERT(client->context->rdp);
1243
0
  return rdp_send_channel_data(client->context->rdp, channelId, data, size);
1244
0
}
1245
1246
static BOOL freerdp_peer_send_server_redirection_pdu(freerdp_peer* peer,
1247
                                                     const rdpRedirection* redirection)
1248
0
{
1249
0
  BOOL rc = FALSE;
1250
0
  WINPR_ASSERT(peer);
1251
0
  WINPR_ASSERT(peer->context);
1252
1253
0
  UINT16 sec_flags = 0;
1254
0
  wStream* s = rdp_send_stream_pdu_init(peer->context->rdp, &sec_flags);
1255
0
  if (!s)
1256
0
    return FALSE;
1257
0
  if (!rdp_write_enhanced_security_redirection_packet(s, redirection))
1258
0
    goto fail;
1259
0
  if (!rdp_send_pdu(peer->context->rdp, s, PDU_TYPE_SERVER_REDIRECTION, 0, sec_flags))
1260
0
    goto fail;
1261
0
  rc = rdp_reset_runtime_settings(peer->context->rdp);
1262
0
fail:
1263
0
  Stream_Release(s);
1264
0
  return rc;
1265
0
}
1266
1267
static BOOL freerdp_peer_send_channel_packet(freerdp_peer* client, UINT16 channelId,
1268
                                             size_t totalSize, UINT32 flags, const BYTE* data,
1269
                                             size_t chunkSize)
1270
0
{
1271
0
  WINPR_ASSERT(client);
1272
0
  WINPR_ASSERT(client->context);
1273
0
  WINPR_ASSERT(client->context->rdp);
1274
0
  return rdp_channel_send_packet(client->context->rdp, channelId, totalSize, flags, data,
1275
0
                                 chunkSize);
1276
0
}
1277
1278
static BOOL freerdp_peer_is_write_blocked(freerdp_peer* peer)
1279
0
{
1280
0
  rdpTransport* transport = NULL;
1281
0
  WINPR_ASSERT(peer);
1282
0
  WINPR_ASSERT(peer->context);
1283
0
  WINPR_ASSERT(peer->context->rdp);
1284
0
  WINPR_ASSERT(peer->context->rdp->transport);
1285
0
  transport = peer->context->rdp->transport;
1286
0
  return transport_is_write_blocked(transport);
1287
0
}
1288
1289
static int freerdp_peer_drain_output_buffer(freerdp_peer* peer)
1290
0
{
1291
0
  rdpTransport* transport = NULL;
1292
0
  WINPR_ASSERT(peer);
1293
0
  WINPR_ASSERT(peer->context);
1294
0
  WINPR_ASSERT(peer->context->rdp);
1295
0
  WINPR_ASSERT(peer->context->rdp->transport);
1296
0
  transport = peer->context->rdp->transport;
1297
0
  return transport_drain_output_buffer(transport);
1298
0
}
1299
1300
static BOOL freerdp_peer_has_more_to_read(freerdp_peer* peer)
1301
0
{
1302
0
  WINPR_ASSERT(peer);
1303
0
  WINPR_ASSERT(peer->context);
1304
0
  WINPR_ASSERT(peer->context->rdp);
1305
0
  return transport_have_more_bytes_to_read(peer->context->rdp->transport);
1306
0
}
1307
1308
static LicenseCallbackResult freerdp_peer_nolicense(freerdp_peer* peer,
1309
                                                    WINPR_ATTR_UNUSED wStream* s)
1310
0
{
1311
0
  rdpRdp* rdp = NULL;
1312
1313
0
  WINPR_ASSERT(peer);
1314
0
  WINPR_ASSERT(peer->context);
1315
1316
0
  rdp = peer->context->rdp;
1317
1318
0
  if (!license_send_valid_client_error_packet(rdp))
1319
0
  {
1320
0
    WLog_ERR(TAG, "freerdp_peer_nolicense: license_send_valid_client_error_packet() failed");
1321
0
    return LICENSE_CB_ABORT;
1322
0
  }
1323
1324
0
  return LICENSE_CB_COMPLETED;
1325
0
}
1326
1327
BOOL freerdp_peer_context_new(freerdp_peer* client)
1328
0
{
1329
0
  return freerdp_peer_context_new_ex(client, NULL);
1330
0
}
1331
1332
void freerdp_peer_context_free(freerdp_peer* client)
1333
0
{
1334
0
  if (!client)
1335
0
    return;
1336
1337
0
  IFCALL(client->ContextFree, client, client->context);
1338
1339
0
  if (client->context)
1340
0
  {
1341
0
    rdpContext* ctx = client->context;
1342
1343
0
    (void)CloseHandle(ctx->channelErrorEvent);
1344
0
    ctx->channelErrorEvent = NULL;
1345
0
    free(ctx->errorDescription);
1346
0
    ctx->errorDescription = NULL;
1347
0
    rdp_free(ctx->rdp);
1348
0
    ctx->rdp = NULL;
1349
0
    metrics_free(ctx->metrics);
1350
0
    ctx->metrics = NULL;
1351
0
    stream_dump_free(ctx->dump);
1352
0
    ctx->dump = NULL;
1353
0
    free(ctx);
1354
0
  }
1355
0
  client->context = NULL;
1356
0
}
1357
1358
static const char* os_major_type_to_string(UINT16 osMajorType)
1359
0
{
1360
0
  switch (osMajorType)
1361
0
  {
1362
0
    case OSMAJORTYPE_UNSPECIFIED:
1363
0
      return "Unspecified platform";
1364
0
    case OSMAJORTYPE_WINDOWS:
1365
0
      return "Windows platform";
1366
0
    case OSMAJORTYPE_OS2:
1367
0
      return "OS/2 platform";
1368
0
    case OSMAJORTYPE_MACINTOSH:
1369
0
      return "Macintosh platform";
1370
0
    case OSMAJORTYPE_UNIX:
1371
0
      return "UNIX platform";
1372
0
    case OSMAJORTYPE_IOS:
1373
0
      return "iOS platform";
1374
0
    case OSMAJORTYPE_OSX:
1375
0
      return "OS X platform";
1376
0
    case OSMAJORTYPE_ANDROID:
1377
0
      return "Android platform";
1378
0
    case OSMAJORTYPE_CHROME_OS:
1379
0
      return "Chrome OS platform";
1380
0
    default:
1381
0
      break;
1382
0
  }
1383
1384
0
  return "Unknown platform";
1385
0
}
1386
1387
const char* freerdp_peer_os_major_type_string(freerdp_peer* client)
1388
0
{
1389
0
  WINPR_ASSERT(client);
1390
1391
0
  rdpContext* context = client->context;
1392
0
  WINPR_ASSERT(context);
1393
0
  WINPR_ASSERT(context->settings);
1394
1395
0
  const UINT32 osMajorType = freerdp_settings_get_uint32(context->settings, FreeRDP_OsMajorType);
1396
0
  WINPR_ASSERT(osMajorType <= UINT16_MAX);
1397
0
  return os_major_type_to_string((UINT16)osMajorType);
1398
0
}
1399
1400
static const char* os_minor_type_to_string(UINT16 osMinorType)
1401
0
{
1402
0
  switch (osMinorType)
1403
0
  {
1404
0
    case OSMINORTYPE_UNSPECIFIED:
1405
0
      return "Unspecified version";
1406
0
    case OSMINORTYPE_WINDOWS_31X:
1407
0
      return "Windows 3.1x";
1408
0
    case OSMINORTYPE_WINDOWS_95:
1409
0
      return "Windows 95";
1410
0
    case OSMINORTYPE_WINDOWS_NT:
1411
0
      return "Windows NT";
1412
0
    case OSMINORTYPE_OS2_V21:
1413
0
      return "OS/2 2.1";
1414
0
    case OSMINORTYPE_POWER_PC:
1415
0
      return "PowerPC";
1416
0
    case OSMINORTYPE_MACINTOSH:
1417
0
      return "Macintosh";
1418
0
    case OSMINORTYPE_NATIVE_XSERVER:
1419
0
      return "Native X Server";
1420
0
    case OSMINORTYPE_PSEUDO_XSERVER:
1421
0
      return "Pseudo X Server";
1422
0
    case OSMINORTYPE_WINDOWS_RT:
1423
0
      return "Windows RT";
1424
0
    default:
1425
0
      break;
1426
0
  }
1427
1428
0
  return "Unknown version";
1429
0
}
1430
1431
const char* freerdp_peer_os_minor_type_string(freerdp_peer* client)
1432
0
{
1433
0
  WINPR_ASSERT(client);
1434
1435
0
  rdpContext* context = client->context;
1436
0
  WINPR_ASSERT(context);
1437
0
  WINPR_ASSERT(context->settings);
1438
1439
0
  const UINT32 osMinorType = freerdp_settings_get_uint32(context->settings, FreeRDP_OsMinorType);
1440
0
  WINPR_ASSERT(osMinorType <= UINT16_MAX);
1441
0
  return os_minor_type_to_string((UINT16)osMinorType);
1442
0
}
1443
1444
freerdp_peer* freerdp_peer_new(int sockfd)
1445
0
{
1446
0
  UINT32 option_value = 0;
1447
0
  socklen_t option_len = 0;
1448
0
  freerdp_peer* client = (freerdp_peer*)calloc(1, sizeof(freerdp_peer));
1449
1450
0
  if (!client)
1451
0
    return NULL;
1452
1453
0
  option_value = TRUE;
1454
0
  option_len = sizeof(option_value);
1455
1456
0
  if (sockfd >= 0)
1457
0
  {
1458
0
    if (setsockopt(sockfd, IPPROTO_TCP, TCP_NODELAY, (void*)&option_value, option_len) < 0)
1459
0
    {
1460
      /* local unix sockets don't have the TCP_NODELAY implemented, so don't make this
1461
       * error fatal */
1462
0
      WLog_DBG(TAG, "can't set TCP_NODELAY, continuing anyway");
1463
0
    }
1464
0
  }
1465
1466
0
  if (client)
1467
0
  {
1468
0
    client->sockfd = sockfd;
1469
0
    client->ContextSize = sizeof(rdpContext);
1470
0
    client->Initialize = freerdp_peer_initialize;
1471
#if defined(WITH_FREERDP_DEPRECATED)
1472
    client->GetFileDescriptor = freerdp_peer_get_fds;
1473
#endif
1474
0
    client->GetEventHandle = freerdp_peer_get_event_handle;
1475
0
    client->GetEventHandles = freerdp_peer_get_event_handles;
1476
0
    client->CheckFileDescriptor = freerdp_peer_check_fds;
1477
0
    client->Close = freerdp_peer_close;
1478
0
    client->Disconnect = freerdp_peer_disconnect;
1479
0
    client->SendChannelData = freerdp_peer_send_channel_data;
1480
0
    client->SendChannelPacket = freerdp_peer_send_channel_packet;
1481
0
    client->SendServerRedirection = freerdp_peer_send_server_redirection_pdu;
1482
0
    client->IsWriteBlocked = freerdp_peer_is_write_blocked;
1483
0
    client->DrainOutputBuffer = freerdp_peer_drain_output_buffer;
1484
0
    client->HasMoreToRead = freerdp_peer_has_more_to_read;
1485
0
    client->VirtualChannelOpen = freerdp_peer_virtual_channel_open;
1486
0
    client->VirtualChannelClose = freerdp_peer_virtual_channel_close;
1487
0
    client->VirtualChannelWrite = freerdp_peer_virtual_channel_write;
1488
0
    client->VirtualChannelRead = NULL; /* must be defined by server application */
1489
0
    client->VirtualChannelGetData = freerdp_peer_virtual_channel_get_data;
1490
0
    client->VirtualChannelSetData = freerdp_peer_virtual_channel_set_data;
1491
0
    client->SetState = freerdp_peer_set_state;
1492
0
  }
1493
1494
0
  return client;
1495
0
}
1496
1497
void freerdp_peer_free(freerdp_peer* client)
1498
0
{
1499
0
  if (!client)
1500
0
    return;
1501
1502
0
  sspi_FreeAuthIdentity(&client->identity);
1503
0
  if (client->sockfd >= 0)
1504
0
    closesocket((SOCKET)client->sockfd);
1505
0
  free(client);
1506
0
}
1507
1508
static BOOL freerdp_peer_transport_setup(freerdp_peer* client)
1509
0
{
1510
0
  rdpRdp* rdp = NULL;
1511
1512
0
  WINPR_ASSERT(client);
1513
0
  WINPR_ASSERT(client->context);
1514
1515
0
  rdp = client->context->rdp;
1516
0
  WINPR_ASSERT(rdp);
1517
1518
0
  if (!transport_attach(rdp->transport, client->sockfd))
1519
0
    return FALSE;
1520
0
  client->sockfd = -1;
1521
1522
0
  if (!transport_set_recv_callbacks(rdp->transport, peer_recv_callback, client))
1523
0
    return FALSE;
1524
1525
0
  if (!transport_set_blocking_mode(rdp->transport, FALSE))
1526
0
    return FALSE;
1527
1528
0
  return TRUE;
1529
0
}
1530
1531
BOOL freerdp_peer_context_new_ex(freerdp_peer* client, const rdpSettings* settings)
1532
0
{
1533
0
  rdpRdp* rdp = NULL;
1534
0
  rdpContext* context = NULL;
1535
0
  BOOL ret = TRUE;
1536
1537
0
  if (!client)
1538
0
    return FALSE;
1539
1540
0
  WINPR_ASSERT(client->ContextSize >= sizeof(rdpContext));
1541
0
  if (!(context = (rdpContext*)calloc(1, client->ContextSize)))
1542
0
    goto fail;
1543
1544
0
  client->context = context;
1545
0
  context->peer = client;
1546
0
  context->ServerMode = TRUE;
1547
0
  context->log = WLog_Get(TAG);
1548
0
  if (!context->log)
1549
0
    goto fail;
1550
1551
0
  if (settings)
1552
0
  {
1553
0
    context->settings = freerdp_settings_clone(settings);
1554
0
    if (!context->settings)
1555
0
      goto fail;
1556
0
  }
1557
1558
0
  context->dump = stream_dump_new();
1559
0
  if (!context->dump)
1560
0
    goto fail;
1561
0
  if (!(context->metrics = metrics_new(context)))
1562
0
    goto fail;
1563
1564
0
  if (!(rdp = rdp_new(context)))
1565
0
    goto fail;
1566
1567
0
  rdp_log_build_warnings(rdp);
1568
1569
#if defined(WITH_FREERDP_DEPRECATED)
1570
  client->update = rdp->update;
1571
  client->settings = rdp->settings;
1572
  client->autodetect = rdp->autodetect;
1573
#endif
1574
0
  context->rdp = rdp;
1575
0
  context->input = rdp->input;
1576
0
  context->update = rdp->update;
1577
0
  context->settings = rdp->settings;
1578
0
  context->autodetect = rdp->autodetect;
1579
0
  update_register_server_callbacks(rdp->update);
1580
0
  autodetect_register_server_callbacks(rdp->autodetect);
1581
1582
0
  if (!(context->channelErrorEvent = CreateEvent(NULL, TRUE, FALSE, NULL)))
1583
0
  {
1584
0
    WLog_ERR(TAG, "CreateEvent failed!");
1585
0
    goto fail;
1586
0
  }
1587
1588
0
  if (!(context->errorDescription = calloc(1, 500)))
1589
0
  {
1590
0
    WLog_ERR(TAG, "calloc failed!");
1591
0
    goto fail;
1592
0
  }
1593
1594
0
  if (!freerdp_peer_transport_setup(client))
1595
0
    goto fail;
1596
1597
0
  client->IsWriteBlocked = freerdp_peer_is_write_blocked;
1598
0
  client->DrainOutputBuffer = freerdp_peer_drain_output_buffer;
1599
0
  client->HasMoreToRead = freerdp_peer_has_more_to_read;
1600
0
  client->LicenseCallback = freerdp_peer_nolicense;
1601
0
  IFCALLRET(client->ContextNew, ret, client, client->context);
1602
1603
0
  if (!ret)
1604
0
    goto fail;
1605
0
  return TRUE;
1606
1607
0
fail:
1608
0
  WLog_ERR(TAG, "ContextNew callback failed");
1609
0
  freerdp_peer_context_free(client);
1610
0
  return FALSE;
1611
0
}