/src/FreeRDP/libfreerdp/core/peer.c
Line | Count | Source (jump to first uncovered line) |
1 | | /** |
2 | | * FreeRDP: A Remote Desktop Protocol Implementation |
3 | | * RDP Server Peer |
4 | | * |
5 | | * Copyright 2011 Vic Lee |
6 | | * Copyright 2014 DI (FH) Martin Haimberger <martin.haimberger@thincast.com> |
7 | | * Copyright 2023 Armin Novak <anovak@thincast.com> |
8 | | * Copyright 2023 Thincast Technologies GmbH |
9 | | * |
10 | | * Licensed under the Apache License, Version 2.0 (the "License"); |
11 | | * you may not use this file except in compliance with the License. |
12 | | * You may obtain a copy of the License at |
13 | | * |
14 | | * http://www.apache.org/licenses/LICENSE-2.0 |
15 | | * |
16 | | * Unless required by applicable law or agreed to in writing, software |
17 | | * distributed under the License is distributed on an "AS IS" BASIS, |
18 | | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
19 | | * See the License for the specific language governing permissions and |
20 | | * limitations under the License. |
21 | | */ |
22 | | |
23 | | #include <freerdp/config.h> |
24 | | |
25 | | #include "settings.h" |
26 | | |
27 | | #include <winpr/assert.h> |
28 | | #include <winpr/cast.h> |
29 | | #include <winpr/crt.h> |
30 | | #include <winpr/winsock.h> |
31 | | |
32 | | #include "info.h" |
33 | | #include "display.h" |
34 | | |
35 | | #include <freerdp/log.h> |
36 | | #include <freerdp/streamdump.h> |
37 | | #include <freerdp/redirection.h> |
38 | | #include <freerdp/crypto/certificate.h> |
39 | | |
40 | | #include "rdp.h" |
41 | | #include "peer.h" |
42 | | #include "multitransport.h" |
43 | | |
44 | 0 | #define TAG FREERDP_TAG("core.peer") |
45 | | |
46 | | static state_run_t peer_recv_pdu(freerdp_peer* client, wStream* s); |
47 | | |
48 | | static HANDLE freerdp_peer_virtual_channel_open(freerdp_peer* client, const char* name, |
49 | | UINT32 flags) |
50 | 0 | { |
51 | 0 | UINT32 index = 0; |
52 | 0 | BOOL joined = FALSE; |
53 | 0 | rdpMcsChannel* mcsChannel = NULL; |
54 | 0 | rdpPeerChannel* peerChannel = NULL; |
55 | 0 | rdpMcs* mcs = NULL; |
56 | |
|
57 | 0 | WINPR_ASSERT(client); |
58 | 0 | WINPR_ASSERT(client->context); |
59 | 0 | WINPR_ASSERT(client->context->rdp); |
60 | 0 | WINPR_ASSERT(name); |
61 | 0 | mcs = client->context->rdp->mcs; |
62 | 0 | WINPR_ASSERT(mcs); |
63 | | |
64 | 0 | if (flags & WTS_CHANNEL_OPTION_DYNAMIC) |
65 | 0 | return NULL; /* not yet supported */ |
66 | | |
67 | 0 | const size_t length = strnlen(name, 9); |
68 | |
|
69 | 0 | if (length > 8) |
70 | 0 | return NULL; /* SVC maximum name length is 8 */ |
71 | | |
72 | 0 | for (; index < mcs->channelCount; index++) |
73 | 0 | { |
74 | 0 | mcsChannel = &(mcs->channels[index]); |
75 | |
|
76 | 0 | if (!mcsChannel->joined) |
77 | 0 | continue; |
78 | | |
79 | 0 | if (_strnicmp(name, mcsChannel->Name, length) == 0) |
80 | 0 | { |
81 | 0 | joined = TRUE; |
82 | 0 | break; |
83 | 0 | } |
84 | 0 | } |
85 | |
|
86 | 0 | if (!joined) |
87 | 0 | return NULL; /* channel is not joined */ |
88 | | |
89 | 0 | peerChannel = (rdpPeerChannel*)mcsChannel->handle; |
90 | |
|
91 | 0 | if (peerChannel) |
92 | 0 | { |
93 | | /* channel is already open */ |
94 | 0 | return (HANDLE)peerChannel; |
95 | 0 | } |
96 | | |
97 | 0 | WINPR_ASSERT(index <= UINT16_MAX); |
98 | 0 | peerChannel = |
99 | 0 | server_channel_common_new(client, (UINT16)index, mcsChannel->ChannelId, 128, NULL, name); |
100 | |
|
101 | 0 | if (peerChannel) |
102 | 0 | { |
103 | 0 | peerChannel->channelFlags = flags; |
104 | 0 | peerChannel->mcsChannel = mcsChannel; |
105 | 0 | mcsChannel->handle = (void*)peerChannel; |
106 | 0 | } |
107 | |
|
108 | 0 | return (HANDLE)peerChannel; |
109 | 0 | } |
110 | | |
111 | | static BOOL freerdp_peer_virtual_channel_close(WINPR_ATTR_UNUSED freerdp_peer* client, |
112 | | HANDLE hChannel) |
113 | 0 | { |
114 | 0 | rdpMcsChannel* mcsChannel = NULL; |
115 | 0 | rdpPeerChannel* peerChannel = NULL; |
116 | |
|
117 | 0 | WINPR_ASSERT(client); |
118 | | |
119 | 0 | if (!hChannel) |
120 | 0 | return FALSE; |
121 | | |
122 | 0 | peerChannel = (rdpPeerChannel*)hChannel; |
123 | 0 | mcsChannel = peerChannel->mcsChannel; |
124 | 0 | WINPR_ASSERT(mcsChannel); |
125 | 0 | mcsChannel->handle = NULL; |
126 | 0 | server_channel_common_free(peerChannel); |
127 | 0 | return TRUE; |
128 | 0 | } |
129 | | |
130 | | static int freerdp_peer_virtual_channel_write(freerdp_peer* client, HANDLE hChannel, |
131 | | const BYTE* buffer, UINT32 length) |
132 | 0 | { |
133 | 0 | wStream* s = NULL; |
134 | 0 | UINT32 flags = 0; |
135 | 0 | UINT32 chunkSize = 0; |
136 | 0 | UINT32 maxChunkSize = 0; |
137 | 0 | UINT32 totalLength = 0; |
138 | 0 | rdpPeerChannel* peerChannel = NULL; |
139 | 0 | rdpMcsChannel* mcsChannel = NULL; |
140 | 0 | rdpRdp* rdp = NULL; |
141 | |
|
142 | 0 | WINPR_ASSERT(client); |
143 | 0 | WINPR_ASSERT(client->context); |
144 | | |
145 | 0 | rdp = client->context->rdp; |
146 | 0 | WINPR_ASSERT(rdp); |
147 | 0 | WINPR_ASSERT(rdp->settings); |
148 | | |
149 | 0 | if (!hChannel) |
150 | 0 | return -1; |
151 | | |
152 | 0 | peerChannel = (rdpPeerChannel*)hChannel; |
153 | 0 | mcsChannel = peerChannel->mcsChannel; |
154 | 0 | WINPR_ASSERT(peerChannel); |
155 | 0 | WINPR_ASSERT(mcsChannel); |
156 | 0 | if (peerChannel->channelFlags & WTS_CHANNEL_OPTION_DYNAMIC) |
157 | 0 | return -1; /* not yet supported */ |
158 | | |
159 | 0 | maxChunkSize = rdp->settings->VCChunkSize; |
160 | 0 | totalLength = length; |
161 | 0 | flags = CHANNEL_FLAG_FIRST; |
162 | |
|
163 | 0 | while (length > 0) |
164 | 0 | { |
165 | 0 | UINT16 sec_flags = 0; |
166 | 0 | s = rdp_send_stream_init(rdp, &sec_flags); |
167 | |
|
168 | 0 | if (!s) |
169 | 0 | return -1; |
170 | | |
171 | 0 | if (length > maxChunkSize) |
172 | 0 | { |
173 | 0 | chunkSize = rdp->settings->VCChunkSize; |
174 | 0 | } |
175 | 0 | else |
176 | 0 | { |
177 | 0 | chunkSize = length; |
178 | 0 | flags |= CHANNEL_FLAG_LAST; |
179 | 0 | } |
180 | |
|
181 | 0 | if (mcsChannel->options & CHANNEL_OPTION_SHOW_PROTOCOL) |
182 | 0 | flags |= CHANNEL_FLAG_SHOW_PROTOCOL; |
183 | |
|
184 | 0 | Stream_Write_UINT32(s, totalLength); |
185 | 0 | Stream_Write_UINT32(s, flags); |
186 | | |
187 | 0 | if (!Stream_EnsureRemainingCapacity(s, chunkSize)) |
188 | 0 | { |
189 | 0 | Stream_Release(s); |
190 | 0 | return -1; |
191 | 0 | } |
192 | | |
193 | 0 | Stream_Write(s, buffer, chunkSize); |
194 | |
|
195 | 0 | WINPR_ASSERT(peerChannel->channelId <= UINT16_MAX); |
196 | 0 | if (!rdp_send(rdp, s, (UINT16)peerChannel->channelId, sec_flags)) |
197 | 0 | return -1; |
198 | | |
199 | 0 | buffer += chunkSize; |
200 | 0 | length -= chunkSize; |
201 | 0 | flags = 0; |
202 | 0 | } |
203 | | |
204 | 0 | return 1; |
205 | 0 | } |
206 | | |
207 | | static void* freerdp_peer_virtual_channel_get_data(WINPR_ATTR_UNUSED freerdp_peer* client, |
208 | | HANDLE hChannel) |
209 | 0 | { |
210 | 0 | rdpPeerChannel* peerChannel = (rdpPeerChannel*)hChannel; |
211 | |
|
212 | 0 | WINPR_ASSERT(client); |
213 | 0 | if (!hChannel) |
214 | 0 | return NULL; |
215 | | |
216 | 0 | return peerChannel->extra; |
217 | 0 | } |
218 | | |
219 | | static int freerdp_peer_virtual_channel_set_data(WINPR_ATTR_UNUSED freerdp_peer* client, |
220 | | HANDLE hChannel, void* data) |
221 | 0 | { |
222 | 0 | rdpPeerChannel* peerChannel = (rdpPeerChannel*)hChannel; |
223 | |
|
224 | 0 | WINPR_ASSERT(client); |
225 | 0 | if (!hChannel) |
226 | 0 | return -1; |
227 | | |
228 | 0 | peerChannel->extra = data; |
229 | 0 | return 1; |
230 | 0 | } |
231 | | |
232 | | static BOOL freerdp_peer_set_state(freerdp_peer* client, CONNECTION_STATE state) |
233 | 0 | { |
234 | 0 | WINPR_ASSERT(client); |
235 | 0 | WINPR_ASSERT(client->context); |
236 | 0 | return rdp_server_transition_to_state(client->context->rdp, state); |
237 | 0 | } |
238 | | |
239 | | static BOOL freerdp_peer_initialize(freerdp_peer* client) |
240 | 0 | { |
241 | 0 | rdpRdp* rdp = NULL; |
242 | 0 | rdpSettings* settings = NULL; |
243 | |
|
244 | 0 | WINPR_ASSERT(client); |
245 | 0 | WINPR_ASSERT(client->context); |
246 | | |
247 | 0 | rdp = client->context->rdp; |
248 | 0 | WINPR_ASSERT(rdp); |
249 | | |
250 | 0 | settings = rdp->settings; |
251 | 0 | WINPR_ASSERT(settings); |
252 | | |
253 | 0 | settings->ServerMode = TRUE; |
254 | 0 | settings->FrameAcknowledge = 0; |
255 | 0 | settings->LocalConnection = client->local; |
256 | |
|
257 | 0 | const rdpCertificate* cert = |
258 | 0 | freerdp_settings_get_pointer(settings, FreeRDP_RdpServerCertificate); |
259 | 0 | if (!cert) |
260 | 0 | { |
261 | 0 | WLog_ERR(TAG, "Missing server certificate, can not continue."); |
262 | 0 | return FALSE; |
263 | 0 | } |
264 | | |
265 | 0 | if (freerdp_settings_get_bool(settings, FreeRDP_RdpSecurity)) |
266 | 0 | { |
267 | |
|
268 | 0 | if (!freerdp_certificate_is_rdp_security_compatible(cert)) |
269 | 0 | { |
270 | 0 | if (!freerdp_settings_set_bool(settings, FreeRDP_RdpSecurity, FALSE)) |
271 | 0 | return FALSE; |
272 | 0 | if (!freerdp_settings_set_bool(settings, FreeRDP_UseRdpSecurityLayer, FALSE)) |
273 | 0 | return FALSE; |
274 | 0 | } |
275 | 0 | } |
276 | | |
277 | 0 | nego_set_RCG_supported(rdp->nego, settings->RemoteCredentialGuard); |
278 | 0 | nego_set_restricted_admin_mode_supported(rdp->nego, settings->RestrictedAdminModeSupported); |
279 | |
|
280 | 0 | if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_INITIAL)) |
281 | 0 | return FALSE; |
282 | | |
283 | 0 | return TRUE; |
284 | 0 | } |
285 | | |
286 | | #if defined(WITH_FREERDP_DEPRECATED) |
287 | | static BOOL freerdp_peer_get_fds(freerdp_peer* client, void** rfds, int* rcount) |
288 | | { |
289 | | rdpTransport* transport = NULL; |
290 | | WINPR_ASSERT(client); |
291 | | WINPR_ASSERT(client->context); |
292 | | WINPR_ASSERT(client->context->rdp); |
293 | | |
294 | | transport = client->context->rdp->transport; |
295 | | WINPR_ASSERT(transport); |
296 | | transport_get_fds(transport, rfds, rcount); |
297 | | return TRUE; |
298 | | } |
299 | | #endif |
300 | | |
301 | | static HANDLE freerdp_peer_get_event_handle(freerdp_peer* client) |
302 | 0 | { |
303 | 0 | HANDLE hEvent = NULL; |
304 | 0 | rdpTransport* transport = NULL; |
305 | 0 | WINPR_ASSERT(client); |
306 | 0 | WINPR_ASSERT(client->context); |
307 | 0 | WINPR_ASSERT(client->context->rdp); |
308 | | |
309 | 0 | transport = client->context->rdp->transport; |
310 | 0 | hEvent = transport_get_front_bio(transport); |
311 | 0 | return hEvent; |
312 | 0 | } |
313 | | |
314 | | static DWORD freerdp_peer_get_event_handles(freerdp_peer* client, HANDLE* events, DWORD count) |
315 | 0 | { |
316 | 0 | WINPR_ASSERT(client); |
317 | 0 | WINPR_ASSERT(client->context); |
318 | 0 | WINPR_ASSERT(client->context->rdp); |
319 | 0 | return transport_get_event_handles(client->context->rdp->transport, events, count); |
320 | 0 | } |
321 | | |
322 | | static BOOL freerdp_peer_check_fds(freerdp_peer* peer) |
323 | 0 | { |
324 | 0 | int status = 0; |
325 | 0 | rdpRdp* rdp = NULL; |
326 | |
|
327 | 0 | WINPR_ASSERT(peer); |
328 | 0 | WINPR_ASSERT(peer->context); |
329 | | |
330 | 0 | rdp = peer->context->rdp; |
331 | 0 | status = rdp_check_fds(rdp); |
332 | |
|
333 | 0 | if (status < 0) |
334 | 0 | return FALSE; |
335 | | |
336 | 0 | return TRUE; |
337 | 0 | } |
338 | | |
339 | | static state_run_t peer_recv_data_pdu(freerdp_peer* client, wStream* s, |
340 | | WINPR_ATTR_UNUSED UINT16 totalLength) |
341 | 0 | { |
342 | 0 | BYTE type = 0; |
343 | 0 | UINT16 length = 0; |
344 | 0 | UINT32 share_id = 0; |
345 | 0 | BYTE compressed_type = 0; |
346 | 0 | UINT16 compressed_len = 0; |
347 | 0 | rdpUpdate* update = NULL; |
348 | |
|
349 | 0 | WINPR_ASSERT(s); |
350 | 0 | WINPR_ASSERT(client); |
351 | 0 | WINPR_ASSERT(client->context); |
352 | 0 | rdpRdp* rdp = client->context->rdp; |
353 | 0 | WINPR_ASSERT(rdp); |
354 | 0 | WINPR_ASSERT(rdp->mcs); |
355 | | |
356 | 0 | update = client->context->update; |
357 | 0 | WINPR_ASSERT(update); |
358 | | |
359 | 0 | if (!rdp_read_share_data_header(rdp, s, &length, &type, &share_id, &compressed_type, |
360 | 0 | &compressed_len)) |
361 | 0 | return STATE_RUN_FAILED; |
362 | | |
363 | | #ifdef WITH_DEBUG_RDP |
364 | | WLog_Print(rdp->log, WLOG_DEBUG, "recv %s Data PDU (0x%02" PRIX8 "), length: %" PRIu16 "", |
365 | | data_pdu_type_to_string(type), type, length); |
366 | | #endif |
367 | | |
368 | 0 | switch (type) |
369 | 0 | { |
370 | 0 | case DATA_PDU_TYPE_SYNCHRONIZE: |
371 | 0 | if (!rdp_recv_client_synchronize_pdu(rdp, s)) |
372 | 0 | return STATE_RUN_FAILED; |
373 | | |
374 | 0 | break; |
375 | | |
376 | 0 | case DATA_PDU_TYPE_CONTROL: |
377 | 0 | if (!rdp_server_accept_client_control_pdu(rdp, s)) |
378 | 0 | return STATE_RUN_FAILED; |
379 | | |
380 | 0 | break; |
381 | | |
382 | 0 | case DATA_PDU_TYPE_INPUT: |
383 | 0 | if (!input_recv(rdp->input, s)) |
384 | 0 | return STATE_RUN_FAILED; |
385 | | |
386 | 0 | break; |
387 | | |
388 | 0 | case DATA_PDU_TYPE_BITMAP_CACHE_PERSISTENT_LIST: |
389 | 0 | if (!rdp_server_accept_client_persistent_key_list_pdu(rdp, s)) |
390 | 0 | return STATE_RUN_FAILED; |
391 | 0 | break; |
392 | | |
393 | 0 | case DATA_PDU_TYPE_FONT_LIST: |
394 | 0 | if (!rdp_server_accept_client_font_list_pdu(rdp, s)) |
395 | 0 | return STATE_RUN_FAILED; |
396 | | |
397 | 0 | return STATE_RUN_CONTINUE; // State changed, trigger rerun |
398 | | |
399 | 0 | case DATA_PDU_TYPE_SHUTDOWN_REQUEST: |
400 | 0 | mcs_send_disconnect_provider_ultimatum(rdp->mcs, |
401 | 0 | Disconnect_Ultimatum_provider_initiated); |
402 | 0 | WLog_WARN(TAG, "disconnect provider ultimatum sent to peer, closing connection"); |
403 | 0 | return STATE_RUN_QUIT_SESSION; |
404 | | |
405 | 0 | case DATA_PDU_TYPE_FRAME_ACKNOWLEDGE: |
406 | 0 | if (!Stream_CheckAndLogRequiredLength(TAG, s, 4)) |
407 | 0 | return STATE_RUN_FAILED; |
408 | | |
409 | 0 | Stream_Read_UINT32(s, client->ack_frame_id); |
410 | 0 | IFCALL(update->SurfaceFrameAcknowledge, update->context, client->ack_frame_id); |
411 | 0 | break; |
412 | | |
413 | 0 | case DATA_PDU_TYPE_REFRESH_RECT: |
414 | 0 | if (!update_read_refresh_rect(update, s)) |
415 | 0 | return STATE_RUN_FAILED; |
416 | | |
417 | 0 | break; |
418 | | |
419 | 0 | case DATA_PDU_TYPE_SUPPRESS_OUTPUT: |
420 | 0 | if (!update_read_suppress_output(update, s)) |
421 | 0 | return STATE_RUN_FAILED; |
422 | | |
423 | 0 | break; |
424 | | |
425 | 0 | default: |
426 | 0 | WLog_ERR(TAG, "Data PDU type %" PRIu8 "", type); |
427 | 0 | break; |
428 | 0 | } |
429 | | |
430 | 0 | return STATE_RUN_SUCCESS; |
431 | 0 | } |
432 | | |
433 | | static state_run_t peer_recv_tpkt_pdu(freerdp_peer* client, wStream* s) |
434 | 0 | { |
435 | 0 | state_run_t rc = STATE_RUN_SUCCESS; |
436 | 0 | UINT16 length = 0; |
437 | 0 | UINT16 pduType = 0; |
438 | 0 | UINT16 pduSource = 0; |
439 | 0 | UINT16 channelId = 0; |
440 | 0 | UINT16 securityFlags = 0; |
441 | |
|
442 | 0 | WINPR_ASSERT(s); |
443 | 0 | WINPR_ASSERT(client); |
444 | 0 | WINPR_ASSERT(client->context); |
445 | | |
446 | 0 | rdpRdp* rdp = client->context->rdp; |
447 | 0 | WINPR_ASSERT(rdp); |
448 | 0 | WINPR_ASSERT(rdp->mcs); |
449 | | |
450 | 0 | rdpSettings* settings = client->context->settings; |
451 | 0 | WINPR_ASSERT(settings); |
452 | | |
453 | 0 | if (!rdp_read_header(rdp, s, &length, &channelId)) |
454 | 0 | return STATE_RUN_FAILED; |
455 | | |
456 | 0 | rdp->inPackets++; |
457 | 0 | if (freerdp_shall_disconnect_context(rdp->context)) |
458 | 0 | return STATE_RUN_SUCCESS; |
459 | | |
460 | 0 | if (rdp_get_state(rdp) <= CONNECTION_STATE_LICENSING) |
461 | 0 | { |
462 | 0 | return rdp_handle_message_channel(rdp, s, channelId, length); |
463 | 0 | } |
464 | | |
465 | 0 | if (!rdp_handle_optional_rdp_decryption(rdp, s, &length, &securityFlags)) |
466 | 0 | return STATE_RUN_FAILED; |
467 | | |
468 | 0 | if (channelId == MCS_GLOBAL_CHANNEL_ID) |
469 | 0 | { |
470 | 0 | char buffer[256] = { 0 }; |
471 | 0 | UINT16 pduLength = 0; |
472 | 0 | UINT16 remain = 0; |
473 | 0 | if (!rdp_read_share_control_header(rdp, s, &pduLength, &remain, &pduType, &pduSource)) |
474 | 0 | return STATE_RUN_FAILED; |
475 | | |
476 | 0 | settings->PduSource = pduSource; |
477 | |
|
478 | 0 | WLog_DBG(TAG, "Received %s", pdu_type_to_str(pduType, buffer, sizeof(buffer))); |
479 | 0 | switch (pduType) |
480 | 0 | { |
481 | 0 | case PDU_TYPE_DATA: |
482 | 0 | rc = peer_recv_data_pdu(client, s, pduLength); |
483 | 0 | break; |
484 | | |
485 | 0 | case PDU_TYPE_CONFIRM_ACTIVE: |
486 | 0 | if (!rdp_server_accept_confirm_active(rdp, s, pduLength)) |
487 | 0 | return STATE_RUN_FAILED; |
488 | | |
489 | 0 | break; |
490 | | |
491 | 0 | case PDU_TYPE_FLOW_RESPONSE: |
492 | 0 | case PDU_TYPE_FLOW_STOP: |
493 | 0 | case PDU_TYPE_FLOW_TEST: |
494 | 0 | if (!Stream_SafeSeek(s, remain)) |
495 | 0 | { |
496 | 0 | WLog_WARN(TAG, "Short PDU, need %" PRIuz " bytes, got %" PRIuz, remain, |
497 | 0 | Stream_GetRemainingLength(s)); |
498 | 0 | return STATE_RUN_FAILED; |
499 | 0 | } |
500 | 0 | break; |
501 | | |
502 | 0 | default: |
503 | 0 | WLog_ERR(TAG, "Client sent unknown pduType %" PRIu16 "", pduType); |
504 | 0 | return STATE_RUN_FAILED; |
505 | 0 | } |
506 | 0 | } |
507 | 0 | else if ((rdp->mcs->messageChannelId > 0) && (channelId == rdp->mcs->messageChannelId)) |
508 | 0 | { |
509 | 0 | if (!settings->UseRdpSecurityLayer) |
510 | 0 | { |
511 | 0 | if (!rdp_read_security_header(rdp, s, &securityFlags, NULL)) |
512 | 0 | return STATE_RUN_FAILED; |
513 | 0 | } |
514 | | |
515 | 0 | return rdp_recv_message_channel_pdu(rdp, s, securityFlags); |
516 | 0 | } |
517 | 0 | else |
518 | 0 | { |
519 | 0 | if (!freerdp_channel_peer_process(client, s, channelId)) |
520 | 0 | return STATE_RUN_FAILED; |
521 | 0 | } |
522 | 0 | if (!tpkt_ensure_stream_consumed(rdp->log, s, length)) |
523 | 0 | return STATE_RUN_FAILED; |
524 | | |
525 | 0 | return rc; |
526 | 0 | } |
527 | | |
528 | | static state_run_t peer_recv_handle_auto_detect(freerdp_peer* client, wStream* s) |
529 | 0 | { |
530 | 0 | state_run_t ret = STATE_RUN_FAILED; |
531 | 0 | rdpRdp* rdp = NULL; |
532 | |
|
533 | 0 | WINPR_ASSERT(client); |
534 | 0 | WINPR_ASSERT(s); |
535 | 0 | WINPR_ASSERT(client->context); |
536 | | |
537 | 0 | rdp = client->context->rdp; |
538 | 0 | WINPR_ASSERT(rdp); |
539 | | |
540 | 0 | const rdpSettings* settings = client->context->settings; |
541 | 0 | WINPR_ASSERT(settings); |
542 | | |
543 | 0 | if (freerdp_settings_get_bool(settings, FreeRDP_NetworkAutoDetect)) |
544 | 0 | { |
545 | 0 | switch (rdp_get_state(rdp)) |
546 | 0 | { |
547 | 0 | case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_REQUEST: |
548 | 0 | autodetect_on_connect_time_auto_detect_begin(rdp->autodetect); |
549 | 0 | switch (autodetect_get_state(rdp->autodetect)) |
550 | 0 | { |
551 | 0 | case FREERDP_AUTODETECT_STATE_REQUEST: |
552 | 0 | ret = STATE_RUN_SUCCESS; |
553 | 0 | if (!rdp_server_transition_to_state( |
554 | 0 | rdp, CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_RESPONSE)) |
555 | 0 | return STATE_RUN_FAILED; |
556 | 0 | break; |
557 | 0 | case FREERDP_AUTODETECT_STATE_COMPLETE: |
558 | 0 | ret = STATE_RUN_CONTINUE; /* Rerun in next state */ |
559 | 0 | if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_LICENSING)) |
560 | 0 | return STATE_RUN_FAILED; |
561 | 0 | break; |
562 | 0 | default: |
563 | 0 | break; |
564 | 0 | } |
565 | 0 | break; |
566 | 0 | case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_RESPONSE: |
567 | 0 | ret = peer_recv_pdu(client, s); |
568 | 0 | if (state_run_success(ret)) |
569 | 0 | { |
570 | 0 | autodetect_on_connect_time_auto_detect_progress(rdp->autodetect); |
571 | 0 | switch (autodetect_get_state(rdp->autodetect)) |
572 | 0 | { |
573 | 0 | case FREERDP_AUTODETECT_STATE_REQUEST: |
574 | 0 | ret = STATE_RUN_SUCCESS; |
575 | 0 | break; |
576 | 0 | case FREERDP_AUTODETECT_STATE_COMPLETE: |
577 | 0 | ret = STATE_RUN_CONTINUE; /* Rerun in next state */ |
578 | 0 | if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_LICENSING)) |
579 | 0 | return STATE_RUN_FAILED; |
580 | 0 | break; |
581 | 0 | default: |
582 | 0 | break; |
583 | 0 | } |
584 | 0 | } |
585 | 0 | break; |
586 | 0 | default: |
587 | 0 | WINPR_ASSERT(FALSE); |
588 | 0 | break; |
589 | 0 | } |
590 | 0 | } |
591 | 0 | else |
592 | 0 | { |
593 | 0 | if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_LICENSING)) |
594 | 0 | return STATE_RUN_FAILED; |
595 | | |
596 | 0 | ret = STATE_RUN_CONTINUE; /* Rerun in next state */ |
597 | 0 | } |
598 | | |
599 | 0 | return ret; |
600 | 0 | } |
601 | | |
602 | | static state_run_t peer_recv_handle_licensing(freerdp_peer* client, wStream* s) |
603 | 0 | { |
604 | 0 | state_run_t ret = STATE_RUN_FAILED; |
605 | 0 | rdpRdp* rdp = NULL; |
606 | 0 | rdpSettings* settings = NULL; |
607 | |
|
608 | 0 | WINPR_ASSERT(client); |
609 | 0 | WINPR_ASSERT(s); |
610 | 0 | WINPR_ASSERT(client->context); |
611 | | |
612 | 0 | rdp = client->context->rdp; |
613 | 0 | WINPR_ASSERT(rdp); |
614 | | |
615 | 0 | settings = rdp->settings; |
616 | 0 | WINPR_ASSERT(settings); |
617 | | |
618 | 0 | switch (license_get_state(rdp->license)) |
619 | 0 | { |
620 | 0 | case LICENSE_STATE_INITIAL: |
621 | 0 | { |
622 | 0 | const BOOL required = |
623 | 0 | freerdp_settings_get_bool(settings, FreeRDP_ServerLicenseRequired); |
624 | |
|
625 | 0 | if (required) |
626 | 0 | { |
627 | 0 | if (!license_server_configure(rdp->license)) |
628 | 0 | ret = STATE_RUN_FAILED; |
629 | 0 | else if (!license_server_send_request(rdp->license)) |
630 | 0 | ret = STATE_RUN_FAILED; |
631 | 0 | else |
632 | 0 | ret = STATE_RUN_SUCCESS; |
633 | 0 | } |
634 | 0 | else |
635 | 0 | { |
636 | 0 | if (license_send_valid_client_error_packet(rdp)) |
637 | 0 | ret = STATE_RUN_CONTINUE; /* Rerun in next state, might be capabilities */ |
638 | 0 | } |
639 | 0 | } |
640 | 0 | break; |
641 | 0 | case LICENSE_STATE_COMPLETED: |
642 | 0 | ret = STATE_RUN_CONTINUE; /* Licensing completed, continue in next state */ |
643 | 0 | break; |
644 | 0 | case LICENSE_STATE_ABORTED: |
645 | 0 | ret = STATE_RUN_FAILED; |
646 | 0 | break; |
647 | 0 | default: |
648 | 0 | ret = peer_recv_pdu(client, s); |
649 | 0 | break; |
650 | 0 | } |
651 | | |
652 | 0 | return ret; |
653 | 0 | } |
654 | | |
655 | | static state_run_t peer_recv_fastpath_pdu(freerdp_peer* client, wStream* s) |
656 | 0 | { |
657 | 0 | rdpRdp* rdp = NULL; |
658 | 0 | UINT16 length = 0; |
659 | 0 | BOOL rc = 0; |
660 | 0 | rdpFastPath* fastpath = NULL; |
661 | |
|
662 | 0 | WINPR_ASSERT(s); |
663 | 0 | WINPR_ASSERT(client); |
664 | 0 | WINPR_ASSERT(client->context); |
665 | | |
666 | 0 | rdp = client->context->rdp; |
667 | 0 | WINPR_ASSERT(rdp); |
668 | | |
669 | 0 | fastpath = rdp->fastpath; |
670 | 0 | WINPR_ASSERT(fastpath); |
671 | | |
672 | 0 | rc = fastpath_read_header_rdp(fastpath, s, &length); |
673 | |
|
674 | 0 | if (!rc || (length == 0)) |
675 | 0 | { |
676 | 0 | WLog_ERR(TAG, "incorrect FastPath PDU header length %" PRIu16 "", length); |
677 | 0 | return STATE_RUN_FAILED; |
678 | 0 | } |
679 | 0 | if (!Stream_CheckAndLogRequiredLength(TAG, s, length)) |
680 | 0 | return STATE_RUN_FAILED; |
681 | | |
682 | 0 | if (!fastpath_decrypt(fastpath, s, &length)) |
683 | 0 | return STATE_RUN_FAILED; |
684 | | |
685 | 0 | rdp->inPackets++; |
686 | |
|
687 | 0 | return fastpath_recv_inputs(fastpath, s); |
688 | 0 | } |
689 | | |
690 | | state_run_t peer_recv_pdu(freerdp_peer* client, wStream* s) |
691 | 0 | { |
692 | 0 | int rc = tpkt_verify_header(s); |
693 | |
|
694 | 0 | if (rc > 0) |
695 | 0 | return peer_recv_tpkt_pdu(client, s); |
696 | 0 | else if (rc == 0) |
697 | 0 | return peer_recv_fastpath_pdu(client, s); |
698 | 0 | else |
699 | 0 | return STATE_RUN_FAILED; |
700 | 0 | } |
701 | | |
702 | | static state_run_t peer_unexpected_client_message(rdpRdp* rdp, UINT32 flag) |
703 | 0 | { |
704 | 0 | char buffer[1024] = { 0 }; |
705 | 0 | WLog_WARN(TAG, "Unexpected client message in state %s, missing flag %s", |
706 | 0 | rdp_get_state_string(rdp), rdp_finalize_flags_to_str(flag, buffer, sizeof(buffer))); |
707 | 0 | return STATE_RUN_SUCCESS; /* we ignore this as per spec input PDU are already allowed */ |
708 | 0 | } |
709 | | |
710 | | state_run_t rdp_peer_handle_state_demand_active(freerdp_peer* client) |
711 | 0 | { |
712 | 0 | state_run_t ret = STATE_RUN_FAILED; |
713 | |
|
714 | 0 | WINPR_ASSERT(client); |
715 | 0 | WINPR_ASSERT(client->context); |
716 | | |
717 | 0 | rdpRdp* rdp = client->context->rdp; |
718 | 0 | WINPR_ASSERT(rdp); |
719 | | |
720 | 0 | if (client->Capabilities && !client->Capabilities(client)) |
721 | 0 | { |
722 | 0 | WLog_ERR(TAG, "[%s] freerdp_peer::Capabilities() callback failed", |
723 | 0 | rdp_get_state_string(rdp)); |
724 | 0 | } |
725 | 0 | else if (!rdp_send_demand_active(rdp)) |
726 | 0 | { |
727 | 0 | WLog_ERR(TAG, "[%s] rdp_send_demand_active() fail", rdp_get_state_string(rdp)); |
728 | 0 | } |
729 | 0 | else |
730 | 0 | { |
731 | 0 | if (!rdp_server_transition_to_state(rdp, |
732 | 0 | CONNECTION_STATE_CAPABILITIES_EXCHANGE_MONITOR_LAYOUT)) |
733 | 0 | return STATE_RUN_FAILED; |
734 | 0 | ret = STATE_RUN_CONTINUE; |
735 | 0 | } |
736 | 0 | return ret; |
737 | 0 | } |
738 | | |
739 | | /** \brief Handle server peer state ACTIVE: |
740 | | * On initial run (not connected, not activated) do not read data |
741 | | * |
742 | | * \return -1 in case of an error, 0 if no data needs to be processed, 1 to let |
743 | | * the state machine run again and 2 if peer_recv_pdu must be called. |
744 | | */ |
745 | | static state_run_t rdp_peer_handle_state_active(freerdp_peer* client) |
746 | 0 | { |
747 | 0 | state_run_t ret = STATE_RUN_FAILED; |
748 | |
|
749 | 0 | WINPR_ASSERT(client); |
750 | 0 | WINPR_ASSERT(client->context); |
751 | | |
752 | 0 | if (!client->connected) |
753 | 0 | { |
754 | | /** |
755 | | * PostConnect should only be called once and should not |
756 | | * be called after a reactivation sequence. |
757 | | */ |
758 | 0 | IFCALLRET(client->PostConnect, client->connected, client); |
759 | 0 | } |
760 | 0 | if (!client->connected) |
761 | 0 | { |
762 | 0 | WLog_ERR(TAG, "PostConnect for peer %p failed", client); |
763 | 0 | ret = STATE_RUN_FAILED; |
764 | 0 | } |
765 | 0 | else if (!client->activated) |
766 | 0 | { |
767 | 0 | BOOL activated = TRUE; |
768 | | |
769 | | /* Set client->activated TRUE before calling the Activate callback. |
770 | | * the Activate callback might reset the client->activated flag even if it returns success |
771 | | * (e.g. deactivate/reactivate sequence) */ |
772 | 0 | client->activated = TRUE; |
773 | 0 | IFCALLRET(client->Activate, activated, client); |
774 | |
|
775 | 0 | if (!activated) |
776 | 0 | { |
777 | 0 | WLog_ERR(TAG, "Activate for peer %p failed", client); |
778 | 0 | ret = STATE_RUN_FAILED; |
779 | 0 | } |
780 | 0 | else |
781 | 0 | ret = STATE_RUN_SUCCESS; |
782 | 0 | } |
783 | 0 | else |
784 | 0 | ret = STATE_RUN_ACTIVE; |
785 | 0 | return ret; |
786 | 0 | } |
787 | | |
788 | | static state_run_t peer_recv_callback_internal(WINPR_ATTR_UNUSED rdpTransport* transport, |
789 | | wStream* s, void* extra) |
790 | 0 | { |
791 | 0 | UINT32 SelectedProtocol = 0; |
792 | 0 | freerdp_peer* client = (freerdp_peer*)extra; |
793 | 0 | rdpRdp* rdp = NULL; |
794 | 0 | state_run_t ret = STATE_RUN_FAILED; |
795 | 0 | rdpSettings* settings = NULL; |
796 | |
|
797 | 0 | WINPR_ASSERT(transport); |
798 | 0 | WINPR_ASSERT(client); |
799 | 0 | WINPR_ASSERT(client->context); |
800 | | |
801 | 0 | rdp = client->context->rdp; |
802 | 0 | WINPR_ASSERT(rdp); |
803 | | |
804 | 0 | settings = client->context->settings; |
805 | 0 | WINPR_ASSERT(settings); |
806 | | |
807 | 0 | IFCALL(client->ReachedState, client, rdp_get_state(rdp)); |
808 | 0 | switch (rdp_get_state(rdp)) |
809 | 0 | { |
810 | 0 | case CONNECTION_STATE_INITIAL: |
811 | 0 | if (!freerdp_settings_enforce_consistency(settings)) |
812 | 0 | ret = STATE_RUN_FAILED; |
813 | 0 | else if (rdp_server_transition_to_state(rdp, CONNECTION_STATE_NEGO)) |
814 | 0 | ret = STATE_RUN_CONTINUE; |
815 | 0 | break; |
816 | | |
817 | 0 | case CONNECTION_STATE_NEGO: |
818 | 0 | if (!rdp_server_accept_nego(rdp, s)) |
819 | 0 | { |
820 | 0 | WLog_ERR(TAG, "%s - rdp_server_accept_nego() fail", rdp_get_state_string(rdp)); |
821 | 0 | } |
822 | 0 | else |
823 | 0 | { |
824 | 0 | SelectedProtocol = nego_get_selected_protocol(rdp->nego); |
825 | 0 | settings->RdstlsSecurity = (SelectedProtocol & PROTOCOL_RDSTLS) ? TRUE : FALSE; |
826 | 0 | settings->NlaSecurity = (SelectedProtocol & PROTOCOL_HYBRID) ? TRUE : FALSE; |
827 | 0 | settings->TlsSecurity = (SelectedProtocol & PROTOCOL_SSL) ? TRUE : FALSE; |
828 | 0 | settings->RdpSecurity = (SelectedProtocol == PROTOCOL_RDP) ? TRUE : FALSE; |
829 | |
|
830 | 0 | if (SelectedProtocol & PROTOCOL_HYBRID) |
831 | 0 | { |
832 | 0 | SEC_WINNT_AUTH_IDENTITY_INFO* identity = |
833 | 0 | (SEC_WINNT_AUTH_IDENTITY_INFO*)nego_get_identity(rdp->nego); |
834 | 0 | sspi_CopyAuthIdentity(&client->identity, identity); |
835 | 0 | IFCALLRET(client->Logon, client->authenticated, client, &client->identity, |
836 | 0 | TRUE); |
837 | 0 | nego_free_nla(rdp->nego); |
838 | 0 | } |
839 | 0 | else |
840 | 0 | { |
841 | 0 | IFCALLRET(client->Logon, client->authenticated, client, &client->identity, |
842 | 0 | FALSE); |
843 | 0 | } |
844 | 0 | if (rdp_server_transition_to_state(rdp, CONNECTION_STATE_MCS_CREATE_REQUEST)) |
845 | 0 | ret = STATE_RUN_SUCCESS; |
846 | 0 | } |
847 | 0 | break; |
848 | | |
849 | 0 | case CONNECTION_STATE_NLA: |
850 | 0 | WINPR_ASSERT(FALSE); // TODO |
851 | 0 | break; |
852 | | |
853 | 0 | case CONNECTION_STATE_MCS_CREATE_REQUEST: |
854 | 0 | if (!rdp_server_accept_mcs_connect_initial(rdp, s)) |
855 | 0 | { |
856 | 0 | WLog_ERR(TAG, |
857 | 0 | "%s - " |
858 | 0 | "rdp_server_accept_mcs_connect_initial() fail", |
859 | 0 | rdp_get_state_string(rdp)); |
860 | 0 | } |
861 | 0 | else |
862 | 0 | ret = STATE_RUN_SUCCESS; |
863 | |
|
864 | 0 | break; |
865 | | |
866 | 0 | case CONNECTION_STATE_MCS_ERECT_DOMAIN: |
867 | 0 | if (!rdp_server_accept_mcs_erect_domain_request(rdp, s)) |
868 | 0 | { |
869 | 0 | WLog_ERR(TAG, |
870 | 0 | "%s - " |
871 | 0 | "rdp_server_accept_mcs_erect_domain_request() fail", |
872 | 0 | rdp_get_state_string(rdp)); |
873 | 0 | } |
874 | 0 | else |
875 | 0 | ret = STATE_RUN_SUCCESS; |
876 | |
|
877 | 0 | break; |
878 | | |
879 | 0 | case CONNECTION_STATE_MCS_ATTACH_USER: |
880 | 0 | if (!rdp_server_accept_mcs_attach_user_request(rdp, s)) |
881 | 0 | { |
882 | 0 | WLog_ERR(TAG, |
883 | 0 | "%s - " |
884 | 0 | "rdp_server_accept_mcs_attach_user_request() fail", |
885 | 0 | rdp_get_state_string(rdp)); |
886 | 0 | } |
887 | 0 | else |
888 | 0 | ret = STATE_RUN_SUCCESS; |
889 | |
|
890 | 0 | break; |
891 | | |
892 | 0 | case CONNECTION_STATE_MCS_CHANNEL_JOIN_REQUEST: |
893 | 0 | if (!rdp_server_accept_mcs_channel_join_request(rdp, s)) |
894 | 0 | { |
895 | 0 | WLog_ERR(TAG, |
896 | 0 | "%s - " |
897 | 0 | "rdp_server_accept_mcs_channel_join_request() fail", |
898 | 0 | rdp_get_state_string(rdp)); |
899 | 0 | } |
900 | 0 | else |
901 | 0 | ret = STATE_RUN_SUCCESS; |
902 | 0 | break; |
903 | | |
904 | 0 | case CONNECTION_STATE_RDP_SECURITY_COMMENCEMENT: |
905 | 0 | ret = STATE_RUN_SUCCESS; |
906 | |
|
907 | 0 | if (!rdp_server_establish_keys(rdp, s)) |
908 | 0 | { |
909 | 0 | WLog_ERR(TAG, |
910 | 0 | "%s - " |
911 | 0 | "rdp_server_establish_keys() fail", |
912 | 0 | rdp_get_state_string(rdp)); |
913 | 0 | ret = STATE_RUN_FAILED; |
914 | 0 | } |
915 | |
|
916 | 0 | if (state_run_success(ret)) |
917 | 0 | { |
918 | 0 | if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_SECURE_SETTINGS_EXCHANGE)) |
919 | 0 | ret = STATE_RUN_FAILED; |
920 | 0 | else if (Stream_GetRemainingLength(s) > 0) |
921 | 0 | ret = STATE_RUN_CONTINUE; /* Rerun function */ |
922 | 0 | } |
923 | 0 | break; |
924 | | |
925 | 0 | case CONNECTION_STATE_SECURE_SETTINGS_EXCHANGE: |
926 | 0 | if (rdp_recv_client_info(rdp, s)) |
927 | 0 | { |
928 | 0 | if (rdp_server_transition_to_state( |
929 | 0 | rdp, CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_REQUEST)) |
930 | 0 | ret = STATE_RUN_CONTINUE; |
931 | 0 | } |
932 | 0 | break; |
933 | | |
934 | 0 | case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_REQUEST: |
935 | 0 | case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_RESPONSE: |
936 | 0 | ret = peer_recv_handle_auto_detect(client, s); |
937 | 0 | break; |
938 | | |
939 | 0 | case CONNECTION_STATE_LICENSING: |
940 | 0 | ret = peer_recv_handle_licensing(client, s); |
941 | 0 | if (ret == STATE_RUN_CONTINUE) |
942 | 0 | { |
943 | 0 | if (!rdp_server_transition_to_state( |
944 | 0 | rdp, CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_REQUEST)) |
945 | 0 | ret = STATE_RUN_FAILED; |
946 | 0 | } |
947 | 0 | break; |
948 | | |
949 | 0 | case CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_REQUEST: |
950 | 0 | if (settings->SupportMultitransport && |
951 | 0 | ((settings->MultitransportFlags & INITIATE_REQUEST_PROTOCOL_UDPFECR) != 0)) |
952 | 0 | { |
953 | | /* only UDP reliable for now, nobody does lossy UDP (MS-RDPUDP only) these days */ |
954 | 0 | ret = multitransport_server_request(rdp->multitransport, |
955 | 0 | INITIATE_REQUEST_PROTOCOL_UDPFECR); |
956 | 0 | switch (ret) |
957 | 0 | { |
958 | 0 | case STATE_RUN_SUCCESS: |
959 | 0 | rdp_server_transition_to_state( |
960 | 0 | rdp, CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_RESPONSE); |
961 | 0 | break; |
962 | 0 | case STATE_RUN_CONTINUE: |
963 | | /* mismatch on the supported kind of UDP transports */ |
964 | 0 | rdp_server_transition_to_state( |
965 | 0 | rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE); |
966 | 0 | break; |
967 | 0 | default: |
968 | 0 | break; |
969 | 0 | } |
970 | 0 | } |
971 | 0 | else |
972 | 0 | { |
973 | 0 | if (rdp_server_transition_to_state( |
974 | 0 | rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE)) |
975 | 0 | ret = STATE_RUN_CONTINUE; /* Rerun, initialize next state */ |
976 | 0 | } |
977 | 0 | break; |
978 | 0 | case CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_RESPONSE: |
979 | 0 | ret = peer_recv_pdu(client, s); |
980 | 0 | break; |
981 | | |
982 | 0 | case CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE: |
983 | 0 | ret = rdp_peer_handle_state_demand_active(client); |
984 | 0 | break; |
985 | | |
986 | 0 | case CONNECTION_STATE_CAPABILITIES_EXCHANGE_MONITOR_LAYOUT: |
987 | 0 | if (freerdp_settings_get_bool(settings, FreeRDP_SupportMonitorLayoutPdu)) |
988 | 0 | { |
989 | 0 | MONITOR_DEF* monitors = NULL; |
990 | |
|
991 | 0 | IFCALL(client->AdjustMonitorsLayout, client); |
992 | | |
993 | | /* client supports the monitorLayout PDU, let's send him the monitors if any */ |
994 | 0 | ret = STATE_RUN_SUCCESS; |
995 | 0 | if (freerdp_settings_get_uint32(settings, FreeRDP_MonitorCount) == 0) |
996 | 0 | { |
997 | 0 | const UINT32 w = freerdp_settings_get_uint32(settings, FreeRDP_DesktopWidth); |
998 | 0 | const UINT32 h = freerdp_settings_get_uint32(settings, FreeRDP_DesktopHeight); |
999 | 0 | const rdpMonitor primary = { .x = 0, |
1000 | 0 | .y = 0, |
1001 | 0 | .width = WINPR_ASSERTING_INT_CAST(int32_t, w), |
1002 | 0 | .height = WINPR_ASSERTING_INT_CAST(int32_t, h), |
1003 | 0 | .is_primary = TRUE, |
1004 | 0 | .orig_screen = 0, |
1005 | 0 | .attributes = { .physicalWidth = w, |
1006 | 0 | .physicalHeight = h, |
1007 | 0 | .orientation = |
1008 | 0 | ORIENTATION_LANDSCAPE, |
1009 | 0 | .desktopScaleFactor = 100, |
1010 | 0 | .deviceScaleFactor = 100 } }; |
1011 | 0 | if (!freerdp_settings_set_pointer_array(settings, FreeRDP_MonitorDefArray, 0, |
1012 | 0 | &primary)) |
1013 | 0 | ret = STATE_RUN_FAILED; |
1014 | 0 | else if (!freerdp_settings_set_uint32(settings, FreeRDP_MonitorCount, 1)) |
1015 | 0 | ret = STATE_RUN_FAILED; |
1016 | 0 | } |
1017 | 0 | if (state_run_failed(ret)) |
1018 | 0 | { |
1019 | 0 | } |
1020 | 0 | else if (!display_convert_rdp_monitor_to_monitor_def( |
1021 | 0 | settings->MonitorCount, settings->MonitorDefArray, &monitors)) |
1022 | 0 | { |
1023 | 0 | ret = STATE_RUN_FAILED; |
1024 | 0 | } |
1025 | 0 | else if (!freerdp_display_send_monitor_layout(rdp->context, settings->MonitorCount, |
1026 | 0 | monitors)) |
1027 | 0 | { |
1028 | 0 | ret = STATE_RUN_FAILED; |
1029 | 0 | } |
1030 | 0 | else |
1031 | 0 | ret = STATE_RUN_SUCCESS; |
1032 | 0 | free(monitors); |
1033 | |
|
1034 | 0 | const size_t len = Stream_GetRemainingLength(s); |
1035 | 0 | if (!state_run_failed(ret) && (len > 0)) |
1036 | 0 | ret = STATE_RUN_CONTINUE; |
1037 | 0 | } |
1038 | 0 | else |
1039 | 0 | { |
1040 | 0 | const size_t len = Stream_GetRemainingLength(s); |
1041 | 0 | if (len > 0) |
1042 | 0 | ret = STATE_RUN_CONTINUE; |
1043 | 0 | else |
1044 | 0 | ret = STATE_RUN_SUCCESS; |
1045 | 0 | } |
1046 | 0 | if (state_run_success(ret)) |
1047 | 0 | { |
1048 | 0 | if (!rdp_server_transition_to_state( |
1049 | 0 | rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE_CONFIRM_ACTIVE)) |
1050 | 0 | ret = STATE_RUN_FAILED; |
1051 | 0 | } |
1052 | 0 | break; |
1053 | | |
1054 | 0 | case CONNECTION_STATE_CAPABILITIES_EXCHANGE_CONFIRM_ACTIVE: |
1055 | | /** |
1056 | | * During reactivation sequence the client might sent some input or channel data |
1057 | | * before receiving the Deactivate All PDU. We need to process them as usual. |
1058 | | */ |
1059 | 0 | ret = peer_recv_pdu(client, s); |
1060 | 0 | break; |
1061 | | |
1062 | 0 | case CONNECTION_STATE_FINALIZATION_SYNC: |
1063 | 0 | ret = peer_recv_pdu(client, s); |
1064 | 0 | if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_SYNCHRONIZE_PDU)) |
1065 | 0 | { |
1066 | 0 | if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_FINALIZATION_COOPERATE)) |
1067 | 0 | ret = STATE_RUN_FAILED; |
1068 | 0 | } |
1069 | 0 | else |
1070 | 0 | ret = peer_unexpected_client_message(rdp, FINALIZE_CS_SYNCHRONIZE_PDU); |
1071 | 0 | break; |
1072 | 0 | case CONNECTION_STATE_FINALIZATION_COOPERATE: |
1073 | 0 | ret = peer_recv_pdu(client, s); |
1074 | 0 | if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_CONTROL_COOPERATE_PDU)) |
1075 | 0 | { |
1076 | 0 | if (!rdp_server_transition_to_state(rdp, |
1077 | 0 | CONNECTION_STATE_FINALIZATION_REQUEST_CONTROL)) |
1078 | 0 | ret = STATE_RUN_FAILED; |
1079 | 0 | } |
1080 | 0 | else |
1081 | 0 | ret = peer_unexpected_client_message(rdp, FINALIZE_CS_CONTROL_COOPERATE_PDU); |
1082 | 0 | break; |
1083 | 0 | case CONNECTION_STATE_FINALIZATION_REQUEST_CONTROL: |
1084 | 0 | ret = peer_recv_pdu(client, s); |
1085 | 0 | if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_CONTROL_REQUEST_PDU)) |
1086 | 0 | { |
1087 | 0 | if (!rdp_send_server_control_granted_pdu(rdp)) |
1088 | 0 | ret = STATE_RUN_FAILED; |
1089 | 0 | else if (!rdp_server_transition_to_state( |
1090 | 0 | rdp, CONNECTION_STATE_FINALIZATION_PERSISTENT_KEY_LIST)) |
1091 | 0 | ret = STATE_RUN_FAILED; |
1092 | 0 | } |
1093 | 0 | else |
1094 | 0 | ret = peer_unexpected_client_message(rdp, FINALIZE_CS_CONTROL_REQUEST_PDU); |
1095 | 0 | break; |
1096 | 0 | case CONNECTION_STATE_FINALIZATION_PERSISTENT_KEY_LIST: |
1097 | 0 | if (freerdp_settings_get_bool(settings, FreeRDP_BitmapCachePersistEnabled) && |
1098 | 0 | !rdp_finalize_is_flag_set(rdp, FINALIZE_DEACTIVATE_REACTIVATE)) |
1099 | 0 | { |
1100 | 0 | ret = peer_recv_pdu(client, s); |
1101 | |
|
1102 | 0 | if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_PERSISTENT_KEY_LIST_PDU)) |
1103 | 0 | { |
1104 | 0 | if (!rdp_server_transition_to_state(rdp, |
1105 | 0 | CONNECTION_STATE_FINALIZATION_FONT_LIST)) |
1106 | 0 | ret = STATE_RUN_FAILED; |
1107 | 0 | } |
1108 | 0 | else |
1109 | 0 | ret = peer_unexpected_client_message(rdp, |
1110 | 0 | CONNECTION_STATE_FINALIZATION_FONT_LIST); |
1111 | 0 | } |
1112 | 0 | else |
1113 | 0 | { |
1114 | 0 | if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_FINALIZATION_FONT_LIST)) |
1115 | 0 | ret = STATE_RUN_FAILED; |
1116 | 0 | else |
1117 | 0 | ret = STATE_RUN_CONTINUE; |
1118 | 0 | } |
1119 | 0 | break; |
1120 | 0 | case CONNECTION_STATE_FINALIZATION_FONT_LIST: |
1121 | 0 | ret = peer_recv_pdu(client, s); |
1122 | 0 | if (state_run_success(ret)) |
1123 | 0 | { |
1124 | 0 | if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_FONT_LIST_PDU)) |
1125 | 0 | { |
1126 | 0 | if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_ACTIVE)) |
1127 | 0 | ret = STATE_RUN_FAILED; |
1128 | 0 | else |
1129 | 0 | { |
1130 | 0 | update_reset_state(rdp->update); |
1131 | 0 | ret = STATE_RUN_CONTINUE; |
1132 | 0 | } |
1133 | 0 | } |
1134 | 0 | else |
1135 | 0 | ret = peer_unexpected_client_message(rdp, FINALIZE_CS_FONT_LIST_PDU); |
1136 | 0 | } |
1137 | 0 | break; |
1138 | | |
1139 | 0 | case CONNECTION_STATE_ACTIVE: |
1140 | 0 | ret = rdp_peer_handle_state_active(client); |
1141 | 0 | if (ret >= STATE_RUN_ACTIVE) |
1142 | 0 | ret = peer_recv_pdu(client, s); |
1143 | 0 | break; |
1144 | | |
1145 | | /* States that must not happen in server state machine */ |
1146 | 0 | case CONNECTION_STATE_FINALIZATION_CLIENT_SYNC: |
1147 | 0 | case CONNECTION_STATE_FINALIZATION_CLIENT_COOPERATE: |
1148 | 0 | case CONNECTION_STATE_FINALIZATION_CLIENT_GRANTED_CONTROL: |
1149 | 0 | case CONNECTION_STATE_FINALIZATION_CLIENT_FONT_MAP: |
1150 | 0 | default: |
1151 | 0 | WLog_ERR(TAG, "%s state %d", rdp_get_state_string(rdp), rdp_get_state(rdp)); |
1152 | 0 | break; |
1153 | 0 | } |
1154 | | |
1155 | 0 | return ret; |
1156 | 0 | } |
1157 | | |
1158 | | static state_run_t peer_recv_callback(rdpTransport* transport, wStream* s, void* extra) |
1159 | 0 | { |
1160 | 0 | char buffer[64] = { 0 }; |
1161 | 0 | state_run_t rc = STATE_RUN_FAILED; |
1162 | 0 | const size_t start = Stream_GetPosition(s); |
1163 | 0 | const rdpContext* context = transport_get_context(transport); |
1164 | 0 | DWORD level = WLOG_TRACE; |
1165 | 0 | static wLog* log = NULL; |
1166 | 0 | if (!log) |
1167 | 0 | log = WLog_Get(TAG); |
1168 | |
|
1169 | 0 | WINPR_ASSERT(context); |
1170 | 0 | do |
1171 | 0 | { |
1172 | 0 | const rdpRdp* rdp = context->rdp; |
1173 | 0 | const char* old = rdp_get_state_string(rdp); |
1174 | |
|
1175 | 0 | if (rc == STATE_RUN_TRY_AGAIN) |
1176 | 0 | Stream_SetPosition(s, start); |
1177 | 0 | rc = peer_recv_callback_internal(transport, s, extra); |
1178 | |
|
1179 | 0 | const size_t len = Stream_GetRemainingLength(s); |
1180 | 0 | if ((len > 0) && !state_run_continue(rc)) |
1181 | 0 | level = WLOG_WARN; |
1182 | 0 | WLog_Print(log, level, |
1183 | 0 | "(server)[%s -> %s] current return %s [%" PRIuz " bytes not processed]", old, |
1184 | 0 | rdp_get_state_string(rdp), state_run_result_string(rc, buffer, sizeof(buffer)), |
1185 | 0 | len); |
1186 | 0 | } while (state_run_continue(rc)); |
1187 | |
|
1188 | 0 | return rc; |
1189 | 0 | } |
1190 | | |
1191 | | static BOOL freerdp_peer_close(freerdp_peer* client) |
1192 | 0 | { |
1193 | 0 | UINT32 SelectedProtocol = 0; |
1194 | 0 | rdpContext* context = NULL; |
1195 | |
|
1196 | 0 | WINPR_ASSERT(client); |
1197 | | |
1198 | 0 | context = client->context; |
1199 | 0 | WINPR_ASSERT(context); |
1200 | 0 | WINPR_ASSERT(context->settings); |
1201 | 0 | WINPR_ASSERT(context->rdp); |
1202 | | |
1203 | | /** if negotiation has failed, we're not MCS connected. So don't |
1204 | | * send anything else, or some mstsc will consider that as an error |
1205 | | */ |
1206 | 0 | SelectedProtocol = nego_get_selected_protocol(context->rdp->nego); |
1207 | |
|
1208 | 0 | if (SelectedProtocol & PROTOCOL_FAILED_NEGO) |
1209 | 0 | return TRUE; |
1210 | | |
1211 | | /** |
1212 | | * [MS-RDPBCGR] 1.3.1.4.2 User-Initiated Disconnection Sequence on Server |
1213 | | * The server first sends the client a Deactivate All PDU followed by an |
1214 | | * optional MCS Disconnect Provider Ultimatum PDU. |
1215 | | */ |
1216 | 0 | if (!rdp_send_deactivate_all(context->rdp)) |
1217 | 0 | return FALSE; |
1218 | | |
1219 | 0 | if (freerdp_settings_get_bool(context->settings, FreeRDP_SupportErrorInfoPdu)) |
1220 | 0 | { |
1221 | 0 | rdp_send_error_info(context->rdp); |
1222 | 0 | } |
1223 | |
|
1224 | 0 | return mcs_send_disconnect_provider_ultimatum(context->rdp->mcs, |
1225 | 0 | Disconnect_Ultimatum_provider_initiated); |
1226 | 0 | } |
1227 | | |
1228 | | static void freerdp_peer_disconnect(freerdp_peer* client) |
1229 | 0 | { |
1230 | 0 | rdpTransport* transport = NULL; |
1231 | 0 | WINPR_ASSERT(client); |
1232 | | |
1233 | 0 | transport = freerdp_get_transport(client->context); |
1234 | 0 | transport_disconnect(transport); |
1235 | 0 | } |
1236 | | |
1237 | | static BOOL freerdp_peer_send_channel_data(freerdp_peer* client, UINT16 channelId, const BYTE* data, |
1238 | | size_t size) |
1239 | 0 | { |
1240 | 0 | WINPR_ASSERT(client); |
1241 | 0 | WINPR_ASSERT(client->context); |
1242 | 0 | WINPR_ASSERT(client->context->rdp); |
1243 | 0 | return rdp_send_channel_data(client->context->rdp, channelId, data, size); |
1244 | 0 | } |
1245 | | |
1246 | | static BOOL freerdp_peer_send_server_redirection_pdu(freerdp_peer* peer, |
1247 | | const rdpRedirection* redirection) |
1248 | 0 | { |
1249 | 0 | BOOL rc = FALSE; |
1250 | 0 | WINPR_ASSERT(peer); |
1251 | 0 | WINPR_ASSERT(peer->context); |
1252 | | |
1253 | 0 | UINT16 sec_flags = 0; |
1254 | 0 | wStream* s = rdp_send_stream_pdu_init(peer->context->rdp, &sec_flags); |
1255 | 0 | if (!s) |
1256 | 0 | return FALSE; |
1257 | 0 | if (!rdp_write_enhanced_security_redirection_packet(s, redirection)) |
1258 | 0 | goto fail; |
1259 | 0 | if (!rdp_send_pdu(peer->context->rdp, s, PDU_TYPE_SERVER_REDIRECTION, 0, sec_flags)) |
1260 | 0 | goto fail; |
1261 | 0 | rc = rdp_reset_runtime_settings(peer->context->rdp); |
1262 | 0 | fail: |
1263 | 0 | Stream_Release(s); |
1264 | 0 | return rc; |
1265 | 0 | } |
1266 | | |
1267 | | static BOOL freerdp_peer_send_channel_packet(freerdp_peer* client, UINT16 channelId, |
1268 | | size_t totalSize, UINT32 flags, const BYTE* data, |
1269 | | size_t chunkSize) |
1270 | 0 | { |
1271 | 0 | WINPR_ASSERT(client); |
1272 | 0 | WINPR_ASSERT(client->context); |
1273 | 0 | WINPR_ASSERT(client->context->rdp); |
1274 | 0 | return rdp_channel_send_packet(client->context->rdp, channelId, totalSize, flags, data, |
1275 | 0 | chunkSize); |
1276 | 0 | } |
1277 | | |
1278 | | static BOOL freerdp_peer_is_write_blocked(freerdp_peer* peer) |
1279 | 0 | { |
1280 | 0 | rdpTransport* transport = NULL; |
1281 | 0 | WINPR_ASSERT(peer); |
1282 | 0 | WINPR_ASSERT(peer->context); |
1283 | 0 | WINPR_ASSERT(peer->context->rdp); |
1284 | 0 | WINPR_ASSERT(peer->context->rdp->transport); |
1285 | 0 | transport = peer->context->rdp->transport; |
1286 | 0 | return transport_is_write_blocked(transport); |
1287 | 0 | } |
1288 | | |
1289 | | static int freerdp_peer_drain_output_buffer(freerdp_peer* peer) |
1290 | 0 | { |
1291 | 0 | rdpTransport* transport = NULL; |
1292 | 0 | WINPR_ASSERT(peer); |
1293 | 0 | WINPR_ASSERT(peer->context); |
1294 | 0 | WINPR_ASSERT(peer->context->rdp); |
1295 | 0 | WINPR_ASSERT(peer->context->rdp->transport); |
1296 | 0 | transport = peer->context->rdp->transport; |
1297 | 0 | return transport_drain_output_buffer(transport); |
1298 | 0 | } |
1299 | | |
1300 | | static BOOL freerdp_peer_has_more_to_read(freerdp_peer* peer) |
1301 | 0 | { |
1302 | 0 | WINPR_ASSERT(peer); |
1303 | 0 | WINPR_ASSERT(peer->context); |
1304 | 0 | WINPR_ASSERT(peer->context->rdp); |
1305 | 0 | return transport_have_more_bytes_to_read(peer->context->rdp->transport); |
1306 | 0 | } |
1307 | | |
1308 | | static LicenseCallbackResult freerdp_peer_nolicense(freerdp_peer* peer, |
1309 | | WINPR_ATTR_UNUSED wStream* s) |
1310 | 0 | { |
1311 | 0 | rdpRdp* rdp = NULL; |
1312 | |
|
1313 | 0 | WINPR_ASSERT(peer); |
1314 | 0 | WINPR_ASSERT(peer->context); |
1315 | | |
1316 | 0 | rdp = peer->context->rdp; |
1317 | |
|
1318 | 0 | if (!license_send_valid_client_error_packet(rdp)) |
1319 | 0 | { |
1320 | 0 | WLog_ERR(TAG, "freerdp_peer_nolicense: license_send_valid_client_error_packet() failed"); |
1321 | 0 | return LICENSE_CB_ABORT; |
1322 | 0 | } |
1323 | | |
1324 | 0 | return LICENSE_CB_COMPLETED; |
1325 | 0 | } |
1326 | | |
1327 | | BOOL freerdp_peer_context_new(freerdp_peer* client) |
1328 | 0 | { |
1329 | 0 | return freerdp_peer_context_new_ex(client, NULL); |
1330 | 0 | } |
1331 | | |
1332 | | void freerdp_peer_context_free(freerdp_peer* client) |
1333 | 0 | { |
1334 | 0 | if (!client) |
1335 | 0 | return; |
1336 | | |
1337 | 0 | IFCALL(client->ContextFree, client, client->context); |
1338 | |
|
1339 | 0 | if (client->context) |
1340 | 0 | { |
1341 | 0 | rdpContext* ctx = client->context; |
1342 | |
|
1343 | 0 | (void)CloseHandle(ctx->channelErrorEvent); |
1344 | 0 | ctx->channelErrorEvent = NULL; |
1345 | 0 | free(ctx->errorDescription); |
1346 | 0 | ctx->errorDescription = NULL; |
1347 | 0 | rdp_free(ctx->rdp); |
1348 | 0 | ctx->rdp = NULL; |
1349 | 0 | metrics_free(ctx->metrics); |
1350 | 0 | ctx->metrics = NULL; |
1351 | 0 | stream_dump_free(ctx->dump); |
1352 | 0 | ctx->dump = NULL; |
1353 | 0 | free(ctx); |
1354 | 0 | } |
1355 | 0 | client->context = NULL; |
1356 | 0 | } |
1357 | | |
1358 | | static const char* os_major_type_to_string(UINT16 osMajorType) |
1359 | 0 | { |
1360 | 0 | switch (osMajorType) |
1361 | 0 | { |
1362 | 0 | case OSMAJORTYPE_UNSPECIFIED: |
1363 | 0 | return "Unspecified platform"; |
1364 | 0 | case OSMAJORTYPE_WINDOWS: |
1365 | 0 | return "Windows platform"; |
1366 | 0 | case OSMAJORTYPE_OS2: |
1367 | 0 | return "OS/2 platform"; |
1368 | 0 | case OSMAJORTYPE_MACINTOSH: |
1369 | 0 | return "Macintosh platform"; |
1370 | 0 | case OSMAJORTYPE_UNIX: |
1371 | 0 | return "UNIX platform"; |
1372 | 0 | case OSMAJORTYPE_IOS: |
1373 | 0 | return "iOS platform"; |
1374 | 0 | case OSMAJORTYPE_OSX: |
1375 | 0 | return "OS X platform"; |
1376 | 0 | case OSMAJORTYPE_ANDROID: |
1377 | 0 | return "Android platform"; |
1378 | 0 | case OSMAJORTYPE_CHROME_OS: |
1379 | 0 | return "Chrome OS platform"; |
1380 | 0 | default: |
1381 | 0 | break; |
1382 | 0 | } |
1383 | | |
1384 | 0 | return "Unknown platform"; |
1385 | 0 | } |
1386 | | |
1387 | | const char* freerdp_peer_os_major_type_string(freerdp_peer* client) |
1388 | 0 | { |
1389 | 0 | WINPR_ASSERT(client); |
1390 | | |
1391 | 0 | rdpContext* context = client->context; |
1392 | 0 | WINPR_ASSERT(context); |
1393 | 0 | WINPR_ASSERT(context->settings); |
1394 | | |
1395 | 0 | const UINT32 osMajorType = freerdp_settings_get_uint32(context->settings, FreeRDP_OsMajorType); |
1396 | 0 | WINPR_ASSERT(osMajorType <= UINT16_MAX); |
1397 | 0 | return os_major_type_to_string((UINT16)osMajorType); |
1398 | 0 | } |
1399 | | |
1400 | | static const char* os_minor_type_to_string(UINT16 osMinorType) |
1401 | 0 | { |
1402 | 0 | switch (osMinorType) |
1403 | 0 | { |
1404 | 0 | case OSMINORTYPE_UNSPECIFIED: |
1405 | 0 | return "Unspecified version"; |
1406 | 0 | case OSMINORTYPE_WINDOWS_31X: |
1407 | 0 | return "Windows 3.1x"; |
1408 | 0 | case OSMINORTYPE_WINDOWS_95: |
1409 | 0 | return "Windows 95"; |
1410 | 0 | case OSMINORTYPE_WINDOWS_NT: |
1411 | 0 | return "Windows NT"; |
1412 | 0 | case OSMINORTYPE_OS2_V21: |
1413 | 0 | return "OS/2 2.1"; |
1414 | 0 | case OSMINORTYPE_POWER_PC: |
1415 | 0 | return "PowerPC"; |
1416 | 0 | case OSMINORTYPE_MACINTOSH: |
1417 | 0 | return "Macintosh"; |
1418 | 0 | case OSMINORTYPE_NATIVE_XSERVER: |
1419 | 0 | return "Native X Server"; |
1420 | 0 | case OSMINORTYPE_PSEUDO_XSERVER: |
1421 | 0 | return "Pseudo X Server"; |
1422 | 0 | case OSMINORTYPE_WINDOWS_RT: |
1423 | 0 | return "Windows RT"; |
1424 | 0 | default: |
1425 | 0 | break; |
1426 | 0 | } |
1427 | | |
1428 | 0 | return "Unknown version"; |
1429 | 0 | } |
1430 | | |
1431 | | const char* freerdp_peer_os_minor_type_string(freerdp_peer* client) |
1432 | 0 | { |
1433 | 0 | WINPR_ASSERT(client); |
1434 | | |
1435 | 0 | rdpContext* context = client->context; |
1436 | 0 | WINPR_ASSERT(context); |
1437 | 0 | WINPR_ASSERT(context->settings); |
1438 | | |
1439 | 0 | const UINT32 osMinorType = freerdp_settings_get_uint32(context->settings, FreeRDP_OsMinorType); |
1440 | 0 | WINPR_ASSERT(osMinorType <= UINT16_MAX); |
1441 | 0 | return os_minor_type_to_string((UINT16)osMinorType); |
1442 | 0 | } |
1443 | | |
1444 | | freerdp_peer* freerdp_peer_new(int sockfd) |
1445 | 0 | { |
1446 | 0 | UINT32 option_value = 0; |
1447 | 0 | socklen_t option_len = 0; |
1448 | 0 | freerdp_peer* client = (freerdp_peer*)calloc(1, sizeof(freerdp_peer)); |
1449 | |
|
1450 | 0 | if (!client) |
1451 | 0 | return NULL; |
1452 | | |
1453 | 0 | option_value = TRUE; |
1454 | 0 | option_len = sizeof(option_value); |
1455 | |
|
1456 | 0 | if (sockfd >= 0) |
1457 | 0 | { |
1458 | 0 | if (setsockopt(sockfd, IPPROTO_TCP, TCP_NODELAY, (void*)&option_value, option_len) < 0) |
1459 | 0 | { |
1460 | | /* local unix sockets don't have the TCP_NODELAY implemented, so don't make this |
1461 | | * error fatal */ |
1462 | 0 | WLog_DBG(TAG, "can't set TCP_NODELAY, continuing anyway"); |
1463 | 0 | } |
1464 | 0 | } |
1465 | |
|
1466 | 0 | if (client) |
1467 | 0 | { |
1468 | 0 | client->sockfd = sockfd; |
1469 | 0 | client->ContextSize = sizeof(rdpContext); |
1470 | 0 | client->Initialize = freerdp_peer_initialize; |
1471 | | #if defined(WITH_FREERDP_DEPRECATED) |
1472 | | client->GetFileDescriptor = freerdp_peer_get_fds; |
1473 | | #endif |
1474 | 0 | client->GetEventHandle = freerdp_peer_get_event_handle; |
1475 | 0 | client->GetEventHandles = freerdp_peer_get_event_handles; |
1476 | 0 | client->CheckFileDescriptor = freerdp_peer_check_fds; |
1477 | 0 | client->Close = freerdp_peer_close; |
1478 | 0 | client->Disconnect = freerdp_peer_disconnect; |
1479 | 0 | client->SendChannelData = freerdp_peer_send_channel_data; |
1480 | 0 | client->SendChannelPacket = freerdp_peer_send_channel_packet; |
1481 | 0 | client->SendServerRedirection = freerdp_peer_send_server_redirection_pdu; |
1482 | 0 | client->IsWriteBlocked = freerdp_peer_is_write_blocked; |
1483 | 0 | client->DrainOutputBuffer = freerdp_peer_drain_output_buffer; |
1484 | 0 | client->HasMoreToRead = freerdp_peer_has_more_to_read; |
1485 | 0 | client->VirtualChannelOpen = freerdp_peer_virtual_channel_open; |
1486 | 0 | client->VirtualChannelClose = freerdp_peer_virtual_channel_close; |
1487 | 0 | client->VirtualChannelWrite = freerdp_peer_virtual_channel_write; |
1488 | 0 | client->VirtualChannelRead = NULL; /* must be defined by server application */ |
1489 | 0 | client->VirtualChannelGetData = freerdp_peer_virtual_channel_get_data; |
1490 | 0 | client->VirtualChannelSetData = freerdp_peer_virtual_channel_set_data; |
1491 | 0 | client->SetState = freerdp_peer_set_state; |
1492 | 0 | } |
1493 | |
|
1494 | 0 | return client; |
1495 | 0 | } |
1496 | | |
1497 | | void freerdp_peer_free(freerdp_peer* client) |
1498 | 0 | { |
1499 | 0 | if (!client) |
1500 | 0 | return; |
1501 | | |
1502 | 0 | sspi_FreeAuthIdentity(&client->identity); |
1503 | 0 | if (client->sockfd >= 0) |
1504 | 0 | closesocket((SOCKET)client->sockfd); |
1505 | 0 | free(client); |
1506 | 0 | } |
1507 | | |
1508 | | static BOOL freerdp_peer_transport_setup(freerdp_peer* client) |
1509 | 0 | { |
1510 | 0 | rdpRdp* rdp = NULL; |
1511 | |
|
1512 | 0 | WINPR_ASSERT(client); |
1513 | 0 | WINPR_ASSERT(client->context); |
1514 | | |
1515 | 0 | rdp = client->context->rdp; |
1516 | 0 | WINPR_ASSERT(rdp); |
1517 | | |
1518 | 0 | if (!transport_attach(rdp->transport, client->sockfd)) |
1519 | 0 | return FALSE; |
1520 | 0 | client->sockfd = -1; |
1521 | |
|
1522 | 0 | if (!transport_set_recv_callbacks(rdp->transport, peer_recv_callback, client)) |
1523 | 0 | return FALSE; |
1524 | | |
1525 | 0 | if (!transport_set_blocking_mode(rdp->transport, FALSE)) |
1526 | 0 | return FALSE; |
1527 | | |
1528 | 0 | return TRUE; |
1529 | 0 | } |
1530 | | |
1531 | | BOOL freerdp_peer_context_new_ex(freerdp_peer* client, const rdpSettings* settings) |
1532 | 0 | { |
1533 | 0 | rdpRdp* rdp = NULL; |
1534 | 0 | rdpContext* context = NULL; |
1535 | 0 | BOOL ret = TRUE; |
1536 | |
|
1537 | 0 | if (!client) |
1538 | 0 | return FALSE; |
1539 | | |
1540 | 0 | WINPR_ASSERT(client->ContextSize >= sizeof(rdpContext)); |
1541 | 0 | if (!(context = (rdpContext*)calloc(1, client->ContextSize))) |
1542 | 0 | goto fail; |
1543 | | |
1544 | 0 | client->context = context; |
1545 | 0 | context->peer = client; |
1546 | 0 | context->ServerMode = TRUE; |
1547 | 0 | context->log = WLog_Get(TAG); |
1548 | 0 | if (!context->log) |
1549 | 0 | goto fail; |
1550 | | |
1551 | 0 | if (settings) |
1552 | 0 | { |
1553 | 0 | context->settings = freerdp_settings_clone(settings); |
1554 | 0 | if (!context->settings) |
1555 | 0 | goto fail; |
1556 | 0 | } |
1557 | | |
1558 | 0 | context->dump = stream_dump_new(); |
1559 | 0 | if (!context->dump) |
1560 | 0 | goto fail; |
1561 | 0 | if (!(context->metrics = metrics_new(context))) |
1562 | 0 | goto fail; |
1563 | | |
1564 | 0 | if (!(rdp = rdp_new(context))) |
1565 | 0 | goto fail; |
1566 | | |
1567 | 0 | rdp_log_build_warnings(rdp); |
1568 | |
|
1569 | | #if defined(WITH_FREERDP_DEPRECATED) |
1570 | | client->update = rdp->update; |
1571 | | client->settings = rdp->settings; |
1572 | | client->autodetect = rdp->autodetect; |
1573 | | #endif |
1574 | 0 | context->rdp = rdp; |
1575 | 0 | context->input = rdp->input; |
1576 | 0 | context->update = rdp->update; |
1577 | 0 | context->settings = rdp->settings; |
1578 | 0 | context->autodetect = rdp->autodetect; |
1579 | 0 | update_register_server_callbacks(rdp->update); |
1580 | 0 | autodetect_register_server_callbacks(rdp->autodetect); |
1581 | |
|
1582 | 0 | if (!(context->channelErrorEvent = CreateEvent(NULL, TRUE, FALSE, NULL))) |
1583 | 0 | { |
1584 | 0 | WLog_ERR(TAG, "CreateEvent failed!"); |
1585 | 0 | goto fail; |
1586 | 0 | } |
1587 | | |
1588 | 0 | if (!(context->errorDescription = calloc(1, 500))) |
1589 | 0 | { |
1590 | 0 | WLog_ERR(TAG, "calloc failed!"); |
1591 | 0 | goto fail; |
1592 | 0 | } |
1593 | | |
1594 | 0 | if (!freerdp_peer_transport_setup(client)) |
1595 | 0 | goto fail; |
1596 | | |
1597 | 0 | client->IsWriteBlocked = freerdp_peer_is_write_blocked; |
1598 | 0 | client->DrainOutputBuffer = freerdp_peer_drain_output_buffer; |
1599 | 0 | client->HasMoreToRead = freerdp_peer_has_more_to_read; |
1600 | 0 | client->LicenseCallback = freerdp_peer_nolicense; |
1601 | 0 | IFCALLRET(client->ContextNew, ret, client, client->context); |
1602 | |
|
1603 | 0 | if (!ret) |
1604 | 0 | goto fail; |
1605 | 0 | return TRUE; |
1606 | | |
1607 | 0 | fail: |
1608 | 0 | WLog_ERR(TAG, "ContextNew callback failed"); |
1609 | 0 | freerdp_peer_context_free(client); |
1610 | 0 | return FALSE; |
1611 | 0 | } |