Coverage Report

Created: 2026-02-26 06:54

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/FreeRDP/libfreerdp/core/peer.c
Line
Count
Source
1
/**
2
 * FreeRDP: A Remote Desktop Protocol Implementation
3
 * RDP Server Peer
4
 *
5
 * Copyright 2011 Vic Lee
6
 * Copyright 2014 DI (FH) Martin Haimberger <martin.haimberger@thincast.com>
7
 * Copyright 2023 Armin Novak <anovak@thincast.com>
8
 * Copyright 2023 Thincast Technologies GmbH
9
 *
10
 * Licensed under the Apache License, Version 2.0 (the "License");
11
 * you may not use this file except in compliance with the License.
12
 * You may obtain a copy of the License at
13
 *
14
 *     http://www.apache.org/licenses/LICENSE-2.0
15
 *
16
 * Unless required by applicable law or agreed to in writing, software
17
 * distributed under the License is distributed on an "AS IS" BASIS,
18
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
19
 * See the License for the specific language governing permissions and
20
 * limitations under the License.
21
 */
22
23
#include <freerdp/config.h>
24
25
#include "settings.h"
26
27
#include <winpr/assert.h>
28
#include <winpr/cast.h>
29
#include <winpr/crt.h>
30
#include <winpr/winsock.h>
31
32
#include "info.h"
33
#include "display.h"
34
35
#include <freerdp/log.h>
36
#include <freerdp/streamdump.h>
37
#include <freerdp/redirection.h>
38
#include <freerdp/crypto/certificate.h>
39
40
#include "rdp.h"
41
#include "peer.h"
42
#include "multitransport.h"
43
44
6.40k
#define TAG FREERDP_TAG("core.peer")
45
46
static state_run_t peer_recv_pdu(freerdp_peer* client, wStream* s);
47
48
static HANDLE freerdp_peer_virtual_channel_open(freerdp_peer* client, const char* name,
49
                                                UINT32 flags)
50
0
{
51
0
  UINT32 index = 0;
52
0
  BOOL joined = FALSE;
53
0
  rdpMcsChannel* mcsChannel = NULL;
54
0
  rdpPeerChannel* peerChannel = NULL;
55
0
  rdpMcs* mcs = NULL;
56
57
0
  WINPR_ASSERT(client);
58
0
  WINPR_ASSERT(client->context);
59
0
  WINPR_ASSERT(client->context->rdp);
60
0
  WINPR_ASSERT(name);
61
0
  mcs = client->context->rdp->mcs;
62
0
  WINPR_ASSERT(mcs);
63
64
0
  if (flags & WTS_CHANNEL_OPTION_DYNAMIC)
65
0
    return NULL; /* not yet supported */
66
67
0
  const size_t length = strnlen(name, 9);
68
69
0
  if (length > 8)
70
0
    return NULL; /* SVC maximum name length is 8 */
71
72
0
  for (; index < mcs->channelCount; index++)
73
0
  {
74
0
    mcsChannel = &(mcs->channels[index]);
75
76
0
    if (!mcsChannel->joined)
77
0
      continue;
78
79
0
    if (_strnicmp(name, mcsChannel->Name, length) == 0)
80
0
    {
81
0
      joined = TRUE;
82
0
      break;
83
0
    }
84
0
  }
85
86
0
  if (!joined)
87
0
    return NULL; /* channel is not joined */
88
89
0
  peerChannel = (rdpPeerChannel*)mcsChannel->handle;
90
91
0
  if (peerChannel)
92
0
  {
93
    /* channel is already open */
94
0
    return (HANDLE)peerChannel;
95
0
  }
96
97
0
  WINPR_ASSERT(index <= UINT16_MAX);
98
0
  peerChannel =
99
0
      server_channel_common_new(client, (UINT16)index, mcsChannel->ChannelId, 128, NULL, name);
100
101
0
  if (peerChannel)
102
0
  {
103
0
    peerChannel->channelFlags = flags;
104
0
    peerChannel->mcsChannel = mcsChannel;
105
0
    mcsChannel->handle = (void*)peerChannel;
106
0
  }
107
108
0
  return (HANDLE)peerChannel;
109
0
}
110
111
static BOOL freerdp_peer_virtual_channel_close(WINPR_ATTR_UNUSED freerdp_peer* client,
112
                                               HANDLE hChannel)
113
0
{
114
0
  rdpMcsChannel* mcsChannel = NULL;
115
0
  rdpPeerChannel* peerChannel = NULL;
116
117
0
  WINPR_ASSERT(client);
118
119
0
  if (!hChannel)
120
0
    return FALSE;
121
122
0
  peerChannel = (rdpPeerChannel*)hChannel;
123
0
  mcsChannel = peerChannel->mcsChannel;
124
0
  WINPR_ASSERT(mcsChannel);
125
0
  mcsChannel->handle = NULL;
126
0
  server_channel_common_free(peerChannel);
127
0
  return TRUE;
128
0
}
129
130
static int freerdp_peer_virtual_channel_write(freerdp_peer* client, HANDLE hChannel,
131
                                              const BYTE* buffer, UINT32 length)
132
0
{
133
0
  wStream* s = NULL;
134
0
  UINT32 flags = 0;
135
0
  UINT32 chunkSize = 0;
136
0
  UINT32 maxChunkSize = 0;
137
0
  UINT32 totalLength = 0;
138
0
  rdpPeerChannel* peerChannel = NULL;
139
0
  rdpMcsChannel* mcsChannel = NULL;
140
0
  rdpRdp* rdp = NULL;
141
142
0
  WINPR_ASSERT(client);
143
0
  WINPR_ASSERT(client->context);
144
145
0
  rdp = client->context->rdp;
146
0
  WINPR_ASSERT(rdp);
147
0
  WINPR_ASSERT(rdp->settings);
148
149
0
  if (!hChannel)
150
0
    return -1;
151
152
0
  peerChannel = (rdpPeerChannel*)hChannel;
153
0
  mcsChannel = peerChannel->mcsChannel;
154
0
  WINPR_ASSERT(peerChannel);
155
0
  WINPR_ASSERT(mcsChannel);
156
0
  if (peerChannel->channelFlags & WTS_CHANNEL_OPTION_DYNAMIC)
157
0
    return -1; /* not yet supported */
158
159
0
  maxChunkSize = rdp->settings->VCChunkSize;
160
0
  totalLength = length;
161
0
  flags = CHANNEL_FLAG_FIRST;
162
163
0
  while (length > 0)
164
0
  {
165
0
    UINT16 sec_flags = 0;
166
0
    s = rdp_send_stream_init(rdp, &sec_flags);
167
168
0
    if (!s)
169
0
      return -1;
170
171
0
    if (length > maxChunkSize)
172
0
    {
173
0
      chunkSize = rdp->settings->VCChunkSize;
174
0
    }
175
0
    else
176
0
    {
177
0
      chunkSize = length;
178
0
      flags |= CHANNEL_FLAG_LAST;
179
0
    }
180
181
0
    if (mcsChannel->options & CHANNEL_OPTION_SHOW_PROTOCOL)
182
0
      flags |= CHANNEL_FLAG_SHOW_PROTOCOL;
183
184
0
    Stream_Write_UINT32(s, totalLength);
185
0
    Stream_Write_UINT32(s, flags);
186
187
0
    if (!Stream_EnsureRemainingCapacity(s, chunkSize))
188
0
    {
189
0
      Stream_Release(s);
190
0
      return -1;
191
0
    }
192
193
0
    Stream_Write(s, buffer, chunkSize);
194
195
0
    WINPR_ASSERT(peerChannel->channelId <= UINT16_MAX);
196
0
    if (!rdp_send(rdp, s, (UINT16)peerChannel->channelId, sec_flags))
197
0
      return -1;
198
199
0
    buffer += chunkSize;
200
0
    length -= chunkSize;
201
0
    flags = 0;
202
0
  }
203
204
0
  return 1;
205
0
}
206
207
static void* freerdp_peer_virtual_channel_get_data(WINPR_ATTR_UNUSED freerdp_peer* client,
208
                                                   HANDLE hChannel)
209
0
{
210
0
  rdpPeerChannel* peerChannel = (rdpPeerChannel*)hChannel;
211
212
0
  WINPR_ASSERT(client);
213
0
  if (!hChannel)
214
0
    return NULL;
215
216
0
  return peerChannel->extra;
217
0
}
218
219
static int freerdp_peer_virtual_channel_set_data(WINPR_ATTR_UNUSED freerdp_peer* client,
220
                                                 HANDLE hChannel, void* data)
221
0
{
222
0
  rdpPeerChannel* peerChannel = (rdpPeerChannel*)hChannel;
223
224
0
  WINPR_ASSERT(client);
225
0
  if (!hChannel)
226
0
    return -1;
227
228
0
  peerChannel->extra = data;
229
0
  return 1;
230
0
}
231
232
static BOOL freerdp_peer_set_state(freerdp_peer* client, CONNECTION_STATE state)
233
0
{
234
0
  WINPR_ASSERT(client);
235
0
  WINPR_ASSERT(client->context);
236
0
  return rdp_server_transition_to_state(client->context->rdp, state);
237
0
}
238
239
static BOOL freerdp_peer_initialize(freerdp_peer* client)
240
0
{
241
0
  rdpRdp* rdp = NULL;
242
0
  rdpSettings* settings = NULL;
243
244
0
  WINPR_ASSERT(client);
245
0
  WINPR_ASSERT(client->context);
246
247
0
  rdp = client->context->rdp;
248
0
  WINPR_ASSERT(rdp);
249
250
0
  settings = rdp->settings;
251
0
  WINPR_ASSERT(settings);
252
253
0
  settings->ServerMode = TRUE;
254
0
  settings->FrameAcknowledge = 0;
255
0
  settings->LocalConnection = client->local;
256
257
0
  const rdpCertificate* cert =
258
0
      freerdp_settings_get_pointer(settings, FreeRDP_RdpServerCertificate);
259
0
  if (!cert)
260
0
  {
261
0
    WLog_ERR(TAG, "Missing server certificate, can not continue.");
262
0
    return FALSE;
263
0
  }
264
265
0
  if (freerdp_settings_get_bool(settings, FreeRDP_RdpSecurity))
266
0
  {
267
268
0
    if (!freerdp_certificate_is_rdp_security_compatible(cert))
269
0
    {
270
0
      if (!freerdp_settings_set_bool(settings, FreeRDP_RdpSecurity, FALSE))
271
0
        return FALSE;
272
0
      if (!freerdp_settings_set_bool(settings, FreeRDP_UseRdpSecurityLayer, FALSE))
273
0
        return FALSE;
274
0
    }
275
0
  }
276
277
0
  nego_set_RCG_supported(rdp->nego, settings->RemoteCredentialGuard);
278
0
  nego_set_restricted_admin_mode_supported(rdp->nego, settings->RestrictedAdminModeSupported);
279
280
0
  if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_INITIAL))
281
0
    return FALSE;
282
283
0
  return TRUE;
284
0
}
285
286
#if defined(WITH_FREERDP_DEPRECATED)
287
static BOOL freerdp_peer_get_fds(freerdp_peer* client, void** rfds, int* rcount)
288
{
289
  rdpTransport* transport = NULL;
290
  WINPR_ASSERT(client);
291
  WINPR_ASSERT(client->context);
292
  WINPR_ASSERT(client->context->rdp);
293
294
  transport = client->context->rdp->transport;
295
  WINPR_ASSERT(transport);
296
  transport_get_fds(transport, rfds, rcount);
297
  return TRUE;
298
}
299
#endif
300
301
static HANDLE freerdp_peer_get_event_handle(freerdp_peer* client)
302
0
{
303
0
  HANDLE hEvent = NULL;
304
0
  rdpTransport* transport = NULL;
305
0
  WINPR_ASSERT(client);
306
0
  WINPR_ASSERT(client->context);
307
0
  WINPR_ASSERT(client->context->rdp);
308
309
0
  transport = client->context->rdp->transport;
310
0
  hEvent = transport_get_front_bio(transport);
311
0
  return hEvent;
312
0
}
313
314
static DWORD freerdp_peer_get_event_handles(freerdp_peer* client, HANDLE* events, DWORD count)
315
0
{
316
0
  WINPR_ASSERT(client);
317
0
  WINPR_ASSERT(client->context);
318
0
  WINPR_ASSERT(client->context->rdp);
319
0
  return transport_get_event_handles(client->context->rdp->transport, events, count);
320
0
}
321
322
static BOOL freerdp_peer_check_fds(freerdp_peer* peer)
323
0
{
324
0
  int status = 0;
325
0
  rdpRdp* rdp = NULL;
326
327
0
  WINPR_ASSERT(peer);
328
0
  WINPR_ASSERT(peer->context);
329
330
0
  rdp = peer->context->rdp;
331
0
  status = rdp_check_fds(rdp);
332
333
0
  if (status < 0)
334
0
    return FALSE;
335
336
0
  return TRUE;
337
0
}
338
339
static state_run_t peer_recv_data_pdu(freerdp_peer* client, wStream* s,
340
                                      WINPR_ATTR_UNUSED UINT16 totalLength)
341
0
{
342
0
  BYTE type = 0;
343
0
  UINT16 length = 0;
344
0
  UINT32 share_id = 0;
345
0
  BYTE compressed_type = 0;
346
0
  UINT16 compressed_len = 0;
347
0
  rdpUpdate* update = NULL;
348
349
0
  WINPR_ASSERT(s);
350
0
  WINPR_ASSERT(client);
351
0
  WINPR_ASSERT(client->context);
352
0
  rdpRdp* rdp = client->context->rdp;
353
0
  WINPR_ASSERT(rdp);
354
0
  WINPR_ASSERT(rdp->mcs);
355
356
0
  update = client->context->update;
357
0
  WINPR_ASSERT(update);
358
359
0
  if (!rdp_read_share_data_header(rdp, s, &length, &type, &share_id, &compressed_type,
360
0
                                  &compressed_len))
361
0
    return STATE_RUN_FAILED;
362
363
#ifdef WITH_DEBUG_RDP
364
  WLog_Print(rdp->log, WLOG_DEBUG, "recv %s Data PDU (0x%02" PRIX8 "), length: %" PRIu16 "",
365
             data_pdu_type_to_string(type), type, length);
366
#endif
367
368
0
  switch (type)
369
0
  {
370
0
    case DATA_PDU_TYPE_SYNCHRONIZE:
371
0
      if (!rdp_recv_client_synchronize_pdu(rdp, s))
372
0
        return STATE_RUN_FAILED;
373
374
0
      break;
375
376
0
    case DATA_PDU_TYPE_CONTROL:
377
0
      if (!rdp_server_accept_client_control_pdu(rdp, s))
378
0
        return STATE_RUN_FAILED;
379
380
0
      break;
381
382
0
    case DATA_PDU_TYPE_INPUT:
383
0
      if (!input_recv(rdp->input, s))
384
0
        return STATE_RUN_FAILED;
385
386
0
      break;
387
388
0
    case DATA_PDU_TYPE_BITMAP_CACHE_PERSISTENT_LIST:
389
0
      if (!rdp_server_accept_client_persistent_key_list_pdu(rdp, s))
390
0
        return STATE_RUN_FAILED;
391
0
      break;
392
393
0
    case DATA_PDU_TYPE_FONT_LIST:
394
0
      if (!rdp_server_accept_client_font_list_pdu(rdp, s))
395
0
        return STATE_RUN_FAILED;
396
397
0
      return STATE_RUN_CONTINUE; // State changed, trigger rerun
398
399
0
    case DATA_PDU_TYPE_SHUTDOWN_REQUEST:
400
0
      mcs_send_disconnect_provider_ultimatum(rdp->mcs,
401
0
                                             Disconnect_Ultimatum_provider_initiated);
402
0
      WLog_WARN(TAG, "disconnect provider ultimatum sent to peer, closing connection");
403
0
      return STATE_RUN_QUIT_SESSION;
404
405
0
    case DATA_PDU_TYPE_FRAME_ACKNOWLEDGE:
406
0
      if (!Stream_CheckAndLogRequiredLength(TAG, s, 4))
407
0
        return STATE_RUN_FAILED;
408
409
0
      Stream_Read_UINT32(s, client->ack_frame_id);
410
0
      if (update->SurfaceFrameAcknowledge)
411
0
      {
412
0
        if (!update->SurfaceFrameAcknowledge(update->context, client->ack_frame_id))
413
0
          return STATE_RUN_FAILED;
414
0
      }
415
0
      break;
416
417
0
    case DATA_PDU_TYPE_REFRESH_RECT:
418
0
      if (!update_read_refresh_rect(update, s))
419
0
        return STATE_RUN_FAILED;
420
421
0
      break;
422
423
0
    case DATA_PDU_TYPE_SUPPRESS_OUTPUT:
424
0
      if (!update_read_suppress_output(update, s))
425
0
        return STATE_RUN_FAILED;
426
427
0
      break;
428
429
0
    default:
430
0
      WLog_ERR(TAG, "Data PDU type %" PRIu8 "", type);
431
0
      break;
432
0
  }
433
434
0
  return STATE_RUN_SUCCESS;
435
0
}
436
437
static state_run_t peer_recv_tpkt_pdu(freerdp_peer* client, wStream* s)
438
0
{
439
0
  state_run_t rc = STATE_RUN_SUCCESS;
440
0
  UINT16 length = 0;
441
0
  UINT16 pduType = 0;
442
0
  UINT16 pduSource = 0;
443
0
  UINT16 channelId = 0;
444
0
  UINT16 securityFlags = 0;
445
446
0
  WINPR_ASSERT(s);
447
0
  WINPR_ASSERT(client);
448
0
  WINPR_ASSERT(client->context);
449
450
0
  rdpRdp* rdp = client->context->rdp;
451
0
  WINPR_ASSERT(rdp);
452
0
  WINPR_ASSERT(rdp->mcs);
453
454
0
  rdpSettings* settings = client->context->settings;
455
0
  WINPR_ASSERT(settings);
456
457
0
  if (!rdp_read_header(rdp, s, &length, &channelId))
458
0
    return STATE_RUN_FAILED;
459
460
0
  rdp->inPackets++;
461
0
  if (freerdp_shall_disconnect_context(rdp->context))
462
0
    return STATE_RUN_SUCCESS;
463
464
0
  if (rdp_get_state(rdp) <= CONNECTION_STATE_LICENSING)
465
0
  {
466
0
    return rdp_handle_message_channel(rdp, s, channelId, length);
467
0
  }
468
469
0
  if (!rdp_handle_optional_rdp_decryption(rdp, s, &length, &securityFlags))
470
0
    return STATE_RUN_FAILED;
471
472
0
  if (channelId == MCS_GLOBAL_CHANNEL_ID)
473
0
  {
474
0
    char buffer[256] = WINPR_C_ARRAY_INIT;
475
0
    UINT16 pduLength = 0;
476
0
    UINT16 remain = 0;
477
0
    if (!rdp_read_share_control_header(rdp, s, &pduLength, &remain, &pduType, &pduSource))
478
0
      return STATE_RUN_FAILED;
479
480
0
    settings->PduSource = pduSource;
481
482
0
    WLog_DBG(TAG, "Received %s", pdu_type_to_str(pduType, buffer, sizeof(buffer)));
483
0
    switch (pduType)
484
0
    {
485
0
      case PDU_TYPE_DATA:
486
0
        rc = peer_recv_data_pdu(client, s, pduLength);
487
0
        break;
488
489
0
      case PDU_TYPE_CONFIRM_ACTIVE:
490
0
        if (!rdp_server_accept_confirm_active(rdp, s, pduLength))
491
0
          return STATE_RUN_FAILED;
492
493
0
        break;
494
495
0
      case PDU_TYPE_FLOW_RESPONSE:
496
0
      case PDU_TYPE_FLOW_STOP:
497
0
      case PDU_TYPE_FLOW_TEST:
498
0
        if (!Stream_SafeSeek(s, remain))
499
0
        {
500
0
          WLog_WARN(TAG, "Short PDU, need %" PRIu16 " bytes, got %" PRIuz, remain,
501
0
                    Stream_GetRemainingLength(s));
502
0
          return STATE_RUN_FAILED;
503
0
        }
504
0
        break;
505
506
0
      default:
507
0
        WLog_ERR(TAG, "Client sent unknown pduType %" PRIu16 "", pduType);
508
0
        return STATE_RUN_FAILED;
509
0
    }
510
0
  }
511
0
  else if ((rdp->mcs->messageChannelId > 0) && (channelId == rdp->mcs->messageChannelId))
512
0
  {
513
0
    if (!settings->UseRdpSecurityLayer)
514
0
    {
515
0
      if (!rdp_read_security_header(rdp, s, &securityFlags, NULL))
516
0
        return STATE_RUN_FAILED;
517
0
    }
518
519
0
    return rdp_recv_message_channel_pdu(rdp, s, securityFlags);
520
0
  }
521
0
  else
522
0
  {
523
0
    if (!freerdp_channel_peer_process(client, s, channelId))
524
0
      return STATE_RUN_FAILED;
525
0
  }
526
0
  if (!tpkt_ensure_stream_consumed(rdp->log, s, length))
527
0
    return STATE_RUN_FAILED;
528
529
0
  return rc;
530
0
}
531
532
static state_run_t peer_recv_handle_auto_detect(freerdp_peer* client, wStream* s)
533
0
{
534
0
  state_run_t ret = STATE_RUN_FAILED;
535
0
  rdpRdp* rdp = NULL;
536
537
0
  WINPR_ASSERT(client);
538
0
  WINPR_ASSERT(s);
539
0
  WINPR_ASSERT(client->context);
540
541
0
  rdp = client->context->rdp;
542
0
  WINPR_ASSERT(rdp);
543
544
0
  const rdpSettings* settings = client->context->settings;
545
0
  WINPR_ASSERT(settings);
546
547
0
  if (freerdp_settings_get_bool(settings, FreeRDP_NetworkAutoDetect))
548
0
  {
549
0
    switch (rdp_get_state(rdp))
550
0
    {
551
0
      case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_REQUEST:
552
0
        autodetect_on_connect_time_auto_detect_begin(rdp->autodetect);
553
0
        switch (autodetect_get_state(rdp->autodetect))
554
0
        {
555
0
          case FREERDP_AUTODETECT_STATE_REQUEST:
556
0
            ret = STATE_RUN_SUCCESS;
557
0
            if (!rdp_server_transition_to_state(
558
0
                    rdp, CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_RESPONSE))
559
0
              return STATE_RUN_FAILED;
560
0
            break;
561
0
          case FREERDP_AUTODETECT_STATE_COMPLETE:
562
0
            ret = STATE_RUN_CONTINUE; /* Rerun in next state */
563
0
            if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_LICENSING))
564
0
              return STATE_RUN_FAILED;
565
0
            break;
566
0
          default:
567
0
            break;
568
0
        }
569
0
        break;
570
0
      case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_RESPONSE:
571
0
        ret = peer_recv_pdu(client, s);
572
0
        if (state_run_success(ret))
573
0
        {
574
0
          autodetect_on_connect_time_auto_detect_progress(rdp->autodetect);
575
0
          switch (autodetect_get_state(rdp->autodetect))
576
0
          {
577
0
            case FREERDP_AUTODETECT_STATE_REQUEST:
578
0
              ret = STATE_RUN_SUCCESS;
579
0
              break;
580
0
            case FREERDP_AUTODETECT_STATE_COMPLETE:
581
0
              ret = STATE_RUN_CONTINUE; /* Rerun in next state */
582
0
              if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_LICENSING))
583
0
                return STATE_RUN_FAILED;
584
0
              break;
585
0
            default:
586
0
              break;
587
0
          }
588
0
        }
589
0
        break;
590
0
      default:
591
0
        WINPR_ASSERT(FALSE);
592
0
        break;
593
0
    }
594
0
  }
595
0
  else
596
0
  {
597
0
    if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_LICENSING))
598
0
      return STATE_RUN_FAILED;
599
600
0
    ret = STATE_RUN_CONTINUE; /* Rerun in next state */
601
0
  }
602
603
0
  return ret;
604
0
}
605
606
static state_run_t peer_recv_handle_licensing(freerdp_peer* client, wStream* s)
607
0
{
608
0
  state_run_t ret = STATE_RUN_FAILED;
609
0
  rdpRdp* rdp = NULL;
610
0
  rdpSettings* settings = NULL;
611
612
0
  WINPR_ASSERT(client);
613
0
  WINPR_ASSERT(s);
614
0
  WINPR_ASSERT(client->context);
615
616
0
  rdp = client->context->rdp;
617
0
  WINPR_ASSERT(rdp);
618
619
0
  settings = rdp->settings;
620
0
  WINPR_ASSERT(settings);
621
622
0
  switch (license_get_state(rdp->license))
623
0
  {
624
0
    case LICENSE_STATE_INITIAL:
625
0
    {
626
0
      const BOOL required =
627
0
          freerdp_settings_get_bool(settings, FreeRDP_ServerLicenseRequired);
628
629
0
      if (required)
630
0
      {
631
0
        if (!license_server_configure(rdp->license))
632
0
          ret = STATE_RUN_FAILED;
633
0
        else if (!license_server_send_request(rdp->license))
634
0
          ret = STATE_RUN_FAILED;
635
0
        else
636
0
          ret = STATE_RUN_SUCCESS;
637
0
      }
638
0
      else
639
0
      {
640
0
        if (license_send_valid_client_error_packet(rdp))
641
0
          ret = STATE_RUN_CONTINUE; /* Rerun in next state, might be capabilities */
642
0
      }
643
0
    }
644
0
    break;
645
0
    case LICENSE_STATE_COMPLETED:
646
0
      ret = STATE_RUN_CONTINUE; /* Licensing completed, continue in next state */
647
0
      break;
648
0
    case LICENSE_STATE_ABORTED:
649
0
      ret = STATE_RUN_FAILED;
650
0
      break;
651
0
    default:
652
0
      ret = peer_recv_pdu(client, s);
653
0
      break;
654
0
  }
655
656
0
  return ret;
657
0
}
658
659
static state_run_t peer_recv_fastpath_pdu(freerdp_peer* client, wStream* s)
660
0
{
661
0
  rdpRdp* rdp = NULL;
662
0
  UINT16 length = 0;
663
0
  BOOL rc = 0;
664
0
  rdpFastPath* fastpath = NULL;
665
666
0
  WINPR_ASSERT(s);
667
0
  WINPR_ASSERT(client);
668
0
  WINPR_ASSERT(client->context);
669
670
0
  rdp = client->context->rdp;
671
0
  WINPR_ASSERT(rdp);
672
673
0
  fastpath = rdp->fastpath;
674
0
  WINPR_ASSERT(fastpath);
675
676
0
  rc = fastpath_read_header_rdp(fastpath, s, &length);
677
678
0
  if (!rc || (length == 0))
679
0
  {
680
0
    WLog_ERR(TAG, "incorrect FastPath PDU header length %" PRIu16 "", length);
681
0
    return STATE_RUN_FAILED;
682
0
  }
683
0
  if (!Stream_CheckAndLogRequiredLength(TAG, s, length))
684
0
    return STATE_RUN_FAILED;
685
686
0
  if (!fastpath_decrypt(fastpath, s, &length))
687
0
    return STATE_RUN_FAILED;
688
689
0
  rdp->inPackets++;
690
691
0
  return fastpath_recv_inputs(fastpath, s);
692
0
}
693
694
state_run_t peer_recv_pdu(freerdp_peer* client, wStream* s)
695
0
{
696
0
  int rc = tpkt_verify_header(s);
697
698
0
  if (rc > 0)
699
0
    return peer_recv_tpkt_pdu(client, s);
700
0
  else if (rc == 0)
701
0
    return peer_recv_fastpath_pdu(client, s);
702
0
  else
703
0
    return STATE_RUN_FAILED;
704
0
}
705
706
static state_run_t peer_unexpected_client_message(rdpRdp* rdp, UINT32 flag)
707
0
{
708
0
  char buffer[1024] = WINPR_C_ARRAY_INIT;
709
0
  WLog_WARN(TAG, "Unexpected client message in state %s, missing flag %s",
710
0
            rdp_get_state_string(rdp), rdp_finalize_flags_to_str(flag, buffer, sizeof(buffer)));
711
0
  return STATE_RUN_SUCCESS; /* we ignore this as per spec input PDU are already allowed */
712
0
}
713
714
state_run_t rdp_peer_handle_state_demand_active(freerdp_peer* client)
715
0
{
716
0
  state_run_t ret = STATE_RUN_FAILED;
717
718
0
  WINPR_ASSERT(client);
719
0
  WINPR_ASSERT(client->context);
720
721
0
  rdpRdp* rdp = client->context->rdp;
722
0
  WINPR_ASSERT(rdp);
723
724
0
  if (client->Capabilities && !client->Capabilities(client))
725
0
  {
726
0
    WLog_ERR(TAG, "[%s] freerdp_peer::Capabilities() callback failed",
727
0
             rdp_get_state_string(rdp));
728
0
  }
729
0
  else if (!rdp_send_demand_active(rdp))
730
0
  {
731
0
    WLog_ERR(TAG, "[%s] rdp_send_demand_active() fail", rdp_get_state_string(rdp));
732
0
  }
733
0
  else
734
0
  {
735
0
    if (!rdp_server_transition_to_state(rdp,
736
0
                                        CONNECTION_STATE_CAPABILITIES_EXCHANGE_MONITOR_LAYOUT))
737
0
      return STATE_RUN_FAILED;
738
0
    ret = STATE_RUN_CONTINUE;
739
0
  }
740
0
  return ret;
741
0
}
742
743
/** \brief Handle server peer state ACTIVE:
744
 *  On initial run (not connected, not activated) do not read data
745
 *
746
 *  \return -1 in case of an error, 0 if no data needs to be processed, 1 to let
747
 *  the state machine run again and 2 if peer_recv_pdu must be called.
748
 */
749
static state_run_t rdp_peer_handle_state_active(freerdp_peer* client)
750
0
{
751
0
  state_run_t ret = STATE_RUN_FAILED;
752
753
0
  WINPR_ASSERT(client);
754
0
  WINPR_ASSERT(client->context);
755
756
0
  if (!client->connected)
757
0
  {
758
    /**
759
     * PostConnect should only be called once and should not
760
     * be called after a reactivation sequence.
761
     */
762
0
    IFCALLRET(client->PostConnect, client->connected, client);
763
0
  }
764
0
  if (!client->connected)
765
0
  {
766
0
    WLog_ERR(TAG, "PostConnect for peer %p failed", WINPR_CXX_COMPAT_CAST(const void*, client));
767
0
    ret = STATE_RUN_FAILED;
768
0
  }
769
0
  else if (!client->activated)
770
0
  {
771
0
    BOOL activated = TRUE;
772
773
    /*  Set client->activated TRUE before calling the Activate callback.
774
     *  the Activate callback might reset the client->activated flag even if it returns success
775
     * (e.g. deactivate/reactivate sequence) */
776
0
    client->activated = TRUE;
777
0
    IFCALLRET(client->Activate, activated, client);
778
779
0
    if (!activated)
780
0
    {
781
0
      WLog_ERR(TAG, "Activate for peer %p failed",
782
0
               WINPR_CXX_COMPAT_CAST(const void*, client));
783
0
      ret = STATE_RUN_FAILED;
784
0
    }
785
0
    else
786
0
      ret = STATE_RUN_SUCCESS;
787
0
  }
788
0
  else
789
0
    ret = STATE_RUN_ACTIVE;
790
0
  return ret;
791
0
}
792
793
static state_run_t peer_recv_callback_internal(WINPR_ATTR_UNUSED rdpTransport* transport,
794
                                               wStream* s, void* extra)
795
0
{
796
0
  freerdp_peer* client = (freerdp_peer*)extra;
797
0
  state_run_t ret = STATE_RUN_FAILED;
798
799
0
  WINPR_ASSERT(transport);
800
0
  WINPR_ASSERT(client);
801
0
  WINPR_ASSERT(client->context);
802
803
0
  rdpRdp* rdp = client->context->rdp;
804
0
  WINPR_ASSERT(rdp);
805
806
0
  rdpSettings* settings = client->context->settings;
807
0
  WINPR_ASSERT(settings);
808
809
0
  if (client->ReachedState)
810
0
  {
811
0
    if (!client->ReachedState(client, rdp_get_state(rdp)))
812
0
      return STATE_RUN_FAILED;
813
0
  }
814
0
  switch (rdp_get_state(rdp))
815
0
  {
816
0
    case CONNECTION_STATE_INITIAL:
817
0
      if (!freerdp_settings_enforce_consistency(settings))
818
0
        ret = STATE_RUN_FAILED;
819
0
      else if (rdp_server_transition_to_state(rdp, CONNECTION_STATE_NEGO))
820
0
        ret = STATE_RUN_CONTINUE;
821
0
      break;
822
823
0
    case CONNECTION_STATE_NEGO:
824
0
      if (!rdp_server_accept_nego(rdp, s))
825
0
      {
826
0
        WLog_ERR(TAG, "%s - rdp_server_accept_nego() fail", rdp_get_state_string(rdp));
827
0
      }
828
0
      else
829
0
      {
830
0
        const UINT32 SelectedProtocol = nego_get_selected_protocol(rdp->nego);
831
832
0
        settings->RdstlsSecurity = (SelectedProtocol & PROTOCOL_RDSTLS) ? TRUE : FALSE;
833
0
        settings->NlaSecurity = (SelectedProtocol & PROTOCOL_HYBRID) ? TRUE : FALSE;
834
0
        settings->TlsSecurity = (SelectedProtocol & PROTOCOL_SSL) ? TRUE : FALSE;
835
0
        settings->RdpSecurity = (SelectedProtocol == PROTOCOL_RDP) ? TRUE : FALSE;
836
837
0
        client->authenticated = FALSE;
838
0
        if (SelectedProtocol & PROTOCOL_HYBRID)
839
0
        {
840
0
          SEC_WINNT_AUTH_IDENTITY_INFO* identity =
841
0
              (SEC_WINNT_AUTH_IDENTITY_INFO*)nego_get_identity(rdp->nego);
842
0
          if (sspi_CopyAuthIdentity(&client->identity, identity) >= 0)
843
0
          {
844
0
            client->authenticated =
845
0
                IFCALLRESULT(TRUE, client->Logon, client, &client->identity, TRUE);
846
0
          }
847
0
          nego_free_nla(rdp->nego);
848
0
        }
849
0
        else
850
0
        {
851
0
          client->authenticated =
852
0
              IFCALLRESULT(TRUE, client->Logon, client, &client->identity, FALSE);
853
0
        }
854
0
        if (!client->authenticated)
855
0
          ret = STATE_RUN_FAILED;
856
0
        else
857
0
        {
858
0
          if (rdp_server_transition_to_state(rdp, CONNECTION_STATE_MCS_CREATE_REQUEST))
859
0
            ret = STATE_RUN_SUCCESS;
860
0
        }
861
0
      }
862
0
      break;
863
864
0
    case CONNECTION_STATE_NLA:
865
0
      WINPR_ASSERT(FALSE); // TODO
866
0
      break;
867
868
0
    case CONNECTION_STATE_MCS_CREATE_REQUEST:
869
0
      if (!rdp_server_accept_mcs_connect_initial(rdp, s))
870
0
      {
871
0
        WLog_ERR(TAG,
872
0
                 "%s - "
873
0
                 "rdp_server_accept_mcs_connect_initial() fail",
874
0
                 rdp_get_state_string(rdp));
875
0
      }
876
0
      else
877
0
        ret = STATE_RUN_SUCCESS;
878
879
0
      break;
880
881
0
    case CONNECTION_STATE_MCS_ERECT_DOMAIN:
882
0
      if (!rdp_server_accept_mcs_erect_domain_request(rdp, s))
883
0
      {
884
0
        WLog_ERR(TAG,
885
0
                 "%s - "
886
0
                 "rdp_server_accept_mcs_erect_domain_request() fail",
887
0
                 rdp_get_state_string(rdp));
888
0
      }
889
0
      else
890
0
        ret = STATE_RUN_SUCCESS;
891
892
0
      break;
893
894
0
    case CONNECTION_STATE_MCS_ATTACH_USER:
895
0
      if (!rdp_server_accept_mcs_attach_user_request(rdp, s))
896
0
      {
897
0
        WLog_ERR(TAG,
898
0
                 "%s - "
899
0
                 "rdp_server_accept_mcs_attach_user_request() fail",
900
0
                 rdp_get_state_string(rdp));
901
0
      }
902
0
      else
903
0
        ret = STATE_RUN_SUCCESS;
904
905
0
      break;
906
907
0
    case CONNECTION_STATE_MCS_CHANNEL_JOIN_REQUEST:
908
0
      if (!rdp_server_accept_mcs_channel_join_request(rdp, s))
909
0
      {
910
0
        WLog_ERR(TAG,
911
0
                 "%s - "
912
0
                 "rdp_server_accept_mcs_channel_join_request() fail",
913
0
                 rdp_get_state_string(rdp));
914
0
      }
915
0
      else
916
0
        ret = STATE_RUN_SUCCESS;
917
0
      break;
918
919
0
    case CONNECTION_STATE_RDP_SECURITY_COMMENCEMENT:
920
0
      ret = STATE_RUN_SUCCESS;
921
922
0
      if (!rdp_server_establish_keys(rdp, s))
923
0
      {
924
0
        WLog_ERR(TAG,
925
0
                 "%s - "
926
0
                 "rdp_server_establish_keys() fail",
927
0
                 rdp_get_state_string(rdp));
928
0
        ret = STATE_RUN_FAILED;
929
0
      }
930
931
0
      if (state_run_success(ret))
932
0
      {
933
0
        if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_SECURE_SETTINGS_EXCHANGE))
934
0
          ret = STATE_RUN_FAILED;
935
0
        else if (Stream_GetRemainingLength(s) > 0)
936
0
          ret = STATE_RUN_CONTINUE; /* Rerun function */
937
0
      }
938
0
      break;
939
940
0
    case CONNECTION_STATE_SECURE_SETTINGS_EXCHANGE:
941
0
      if (rdp_recv_client_info(rdp, s))
942
0
      {
943
0
        if (rdp_server_transition_to_state(
944
0
                rdp, CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_REQUEST))
945
0
          ret = STATE_RUN_CONTINUE;
946
0
      }
947
0
      break;
948
949
0
    case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_REQUEST:
950
0
    case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_RESPONSE:
951
0
      ret = peer_recv_handle_auto_detect(client, s);
952
0
      break;
953
954
0
    case CONNECTION_STATE_LICENSING:
955
0
      ret = peer_recv_handle_licensing(client, s);
956
0
      if (ret == STATE_RUN_CONTINUE)
957
0
      {
958
0
        if (!rdp_server_transition_to_state(
959
0
                rdp, CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_REQUEST))
960
0
          ret = STATE_RUN_FAILED;
961
0
      }
962
0
      break;
963
964
0
    case CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_REQUEST:
965
0
      if (settings->SupportMultitransport &&
966
0
          ((settings->MultitransportFlags & INITIATE_REQUEST_PROTOCOL_UDPFECR) != 0))
967
0
      {
968
        /* only UDP reliable for now, nobody does lossy UDP (MS-RDPUDP only) these days */
969
0
        ret = multitransport_server_request(rdp->multitransport,
970
0
                                            INITIATE_REQUEST_PROTOCOL_UDPFECR);
971
0
        switch (ret)
972
0
        {
973
0
          case STATE_RUN_SUCCESS:
974
0
            if (!rdp_server_transition_to_state(
975
0
                    rdp, CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_RESPONSE))
976
0
              ret = STATE_RUN_FAILED;
977
0
            break;
978
0
          case STATE_RUN_CONTINUE:
979
            /* mismatch on the supported kind of UDP transports */
980
0
            if (!rdp_server_transition_to_state(
981
0
                    rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE))
982
0
              ret = STATE_RUN_FAILED;
983
0
            break;
984
0
          default:
985
0
            break;
986
0
        }
987
0
      }
988
0
      else
989
0
      {
990
0
        if (rdp_server_transition_to_state(
991
0
                rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE))
992
0
          ret = STATE_RUN_CONTINUE; /* Rerun, initialize next state */
993
0
      }
994
0
      break;
995
0
    case CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_RESPONSE:
996
0
      ret = peer_recv_pdu(client, s);
997
0
      break;
998
999
0
    case CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE:
1000
0
      ret = rdp_peer_handle_state_demand_active(client);
1001
0
      break;
1002
1003
0
    case CONNECTION_STATE_CAPABILITIES_EXCHANGE_MONITOR_LAYOUT:
1004
0
      if (freerdp_settings_get_bool(settings, FreeRDP_SupportMonitorLayoutPdu))
1005
0
      {
1006
0
        MONITOR_DEF* monitors = NULL;
1007
1008
0
        if (client->AdjustMonitorsLayout)
1009
0
        {
1010
0
          if (!client->AdjustMonitorsLayout(client))
1011
0
            return STATE_RUN_FAILED;
1012
0
        }
1013
1014
        /* client supports the monitorLayout PDU, let's send him the monitors if any */
1015
0
        ret = STATE_RUN_SUCCESS;
1016
0
        if (freerdp_settings_get_uint32(settings, FreeRDP_MonitorCount) == 0)
1017
0
        {
1018
0
          const UINT32 w = freerdp_settings_get_uint32(settings, FreeRDP_DesktopWidth);
1019
0
          const UINT32 h = freerdp_settings_get_uint32(settings, FreeRDP_DesktopHeight);
1020
0
          const rdpMonitor primary = { .x = 0,
1021
0
                                     .y = 0,
1022
0
                                     .width = WINPR_ASSERTING_INT_CAST(int32_t, w),
1023
0
                                     .height = WINPR_ASSERTING_INT_CAST(int32_t, h),
1024
0
                                     .is_primary = TRUE,
1025
0
                                     .orig_screen = 0,
1026
0
                                     .attributes = { .physicalWidth = w,
1027
0
                                                     .physicalHeight = h,
1028
0
                                                     .orientation =
1029
0
                                                         ORIENTATION_LANDSCAPE,
1030
0
                                                     .desktopScaleFactor = 100,
1031
0
                                                     .deviceScaleFactor = 100 } };
1032
0
          if (!freerdp_settings_set_pointer_array(settings, FreeRDP_MonitorDefArray, 0,
1033
0
                                                  &primary))
1034
0
            ret = STATE_RUN_FAILED;
1035
0
          else if (!freerdp_settings_set_uint32(settings, FreeRDP_MonitorCount, 1))
1036
0
            ret = STATE_RUN_FAILED;
1037
0
        }
1038
0
        if (state_run_failed(ret))
1039
0
        {
1040
0
        }
1041
0
        else if (!display_convert_rdp_monitor_to_monitor_def(
1042
0
                     settings->MonitorCount, settings->MonitorDefArray, &monitors))
1043
0
        {
1044
0
          ret = STATE_RUN_FAILED;
1045
0
        }
1046
0
        else if (!freerdp_display_send_monitor_layout(rdp->context, settings->MonitorCount,
1047
0
                                                      monitors))
1048
0
        {
1049
0
          ret = STATE_RUN_FAILED;
1050
0
        }
1051
0
        else
1052
0
          ret = STATE_RUN_SUCCESS;
1053
0
        free(monitors);
1054
1055
0
        const size_t len = Stream_GetRemainingLength(s);
1056
0
        if (!state_run_failed(ret) && (len > 0))
1057
0
          ret = STATE_RUN_CONTINUE;
1058
0
      }
1059
0
      else
1060
0
      {
1061
0
        const size_t len = Stream_GetRemainingLength(s);
1062
0
        if (len > 0)
1063
0
          ret = STATE_RUN_CONTINUE;
1064
0
        else
1065
0
          ret = STATE_RUN_SUCCESS;
1066
0
      }
1067
0
      if (state_run_success(ret))
1068
0
      {
1069
0
        if (!rdp_server_transition_to_state(
1070
0
                rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE_CONFIRM_ACTIVE))
1071
0
          ret = STATE_RUN_FAILED;
1072
0
      }
1073
0
      break;
1074
1075
0
    case CONNECTION_STATE_CAPABILITIES_EXCHANGE_CONFIRM_ACTIVE:
1076
      /**
1077
       * During reactivation sequence the client might sent some input or channel data
1078
       * before receiving the Deactivate All PDU. We need to process them as usual.
1079
       */
1080
0
      ret = peer_recv_pdu(client, s);
1081
0
      break;
1082
1083
0
    case CONNECTION_STATE_FINALIZATION_SYNC:
1084
0
      ret = peer_recv_pdu(client, s);
1085
0
      if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_SYNCHRONIZE_PDU))
1086
0
      {
1087
0
        if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_FINALIZATION_COOPERATE))
1088
0
          ret = STATE_RUN_FAILED;
1089
0
      }
1090
0
      else
1091
0
        ret = peer_unexpected_client_message(rdp, FINALIZE_CS_SYNCHRONIZE_PDU);
1092
0
      break;
1093
0
    case CONNECTION_STATE_FINALIZATION_COOPERATE:
1094
0
      ret = peer_recv_pdu(client, s);
1095
0
      if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_CONTROL_COOPERATE_PDU))
1096
0
      {
1097
0
        if (!rdp_server_transition_to_state(rdp,
1098
0
                                            CONNECTION_STATE_FINALIZATION_REQUEST_CONTROL))
1099
0
          ret = STATE_RUN_FAILED;
1100
0
      }
1101
0
      else
1102
0
        ret = peer_unexpected_client_message(rdp, FINALIZE_CS_CONTROL_COOPERATE_PDU);
1103
0
      break;
1104
0
    case CONNECTION_STATE_FINALIZATION_REQUEST_CONTROL:
1105
0
      ret = peer_recv_pdu(client, s);
1106
0
      if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_CONTROL_REQUEST_PDU))
1107
0
      {
1108
0
        if (!rdp_send_server_control_granted_pdu(rdp))
1109
0
          ret = STATE_RUN_FAILED;
1110
0
        else if (!rdp_server_transition_to_state(
1111
0
                     rdp, CONNECTION_STATE_FINALIZATION_PERSISTENT_KEY_LIST))
1112
0
          ret = STATE_RUN_FAILED;
1113
0
      }
1114
0
      else
1115
0
        ret = peer_unexpected_client_message(rdp, FINALIZE_CS_CONTROL_REQUEST_PDU);
1116
0
      break;
1117
0
    case CONNECTION_STATE_FINALIZATION_PERSISTENT_KEY_LIST:
1118
0
      if (freerdp_settings_get_bool(settings, FreeRDP_BitmapCachePersistEnabled) &&
1119
0
          !rdp_finalize_is_flag_set(rdp, FINALIZE_DEACTIVATE_REACTIVATE))
1120
0
      {
1121
0
        ret = peer_recv_pdu(client, s);
1122
1123
0
        if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_PERSISTENT_KEY_LIST_PDU))
1124
0
        {
1125
0
          if (!rdp_server_transition_to_state(rdp,
1126
0
                                              CONNECTION_STATE_FINALIZATION_FONT_LIST))
1127
0
            ret = STATE_RUN_FAILED;
1128
0
        }
1129
0
        else
1130
0
          ret = peer_unexpected_client_message(rdp,
1131
0
                                               CONNECTION_STATE_FINALIZATION_FONT_LIST);
1132
0
      }
1133
0
      else
1134
0
      {
1135
0
        if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_FINALIZATION_FONT_LIST))
1136
0
          ret = STATE_RUN_FAILED;
1137
0
        else
1138
0
          ret = STATE_RUN_CONTINUE;
1139
0
      }
1140
0
      break;
1141
0
    case CONNECTION_STATE_FINALIZATION_FONT_LIST:
1142
0
      ret = peer_recv_pdu(client, s);
1143
0
      if (state_run_success(ret))
1144
0
      {
1145
0
        if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_FONT_LIST_PDU))
1146
0
        {
1147
0
          if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_ACTIVE))
1148
0
            ret = STATE_RUN_FAILED;
1149
0
          else
1150
0
          {
1151
0
            update_reset_state(rdp->update);
1152
0
            ret = STATE_RUN_CONTINUE;
1153
0
          }
1154
0
        }
1155
0
        else
1156
0
          ret = peer_unexpected_client_message(rdp, FINALIZE_CS_FONT_LIST_PDU);
1157
0
      }
1158
0
      break;
1159
1160
0
    case CONNECTION_STATE_ACTIVE:
1161
0
      ret = rdp_peer_handle_state_active(client);
1162
0
      if (ret >= STATE_RUN_ACTIVE)
1163
0
        ret = peer_recv_pdu(client, s);
1164
0
      break;
1165
1166
      /* States that must not happen in server state machine */
1167
0
    case CONNECTION_STATE_FINALIZATION_CLIENT_SYNC:
1168
0
    case CONNECTION_STATE_FINALIZATION_CLIENT_COOPERATE:
1169
0
    case CONNECTION_STATE_FINALIZATION_CLIENT_GRANTED_CONTROL:
1170
0
    case CONNECTION_STATE_FINALIZATION_CLIENT_FONT_MAP:
1171
0
    default:
1172
0
      WLog_ERR(TAG, "%s state %" PRId32, rdp_get_state_string(rdp),
1173
0
               WINPR_CXX_COMPAT_CAST(int32_t, rdp_get_state(rdp)));
1174
0
      break;
1175
0
  }
1176
1177
0
  return ret;
1178
0
}
1179
1180
static state_run_t peer_recv_callback(rdpTransport* transport, wStream* s, void* extra)
1181
0
{
1182
0
  char buffer[64] = WINPR_C_ARRAY_INIT;
1183
0
  state_run_t rc = STATE_RUN_FAILED;
1184
0
  const size_t start = Stream_GetPosition(s);
1185
0
  const rdpContext* context = transport_get_context(transport);
1186
0
  DWORD level = WLOG_TRACE;
1187
0
  static wLog* log = NULL;
1188
0
  if (!log)
1189
0
    log = WLog_Get(TAG);
1190
1191
0
  WINPR_ASSERT(context);
1192
0
  do
1193
0
  {
1194
0
    const rdpRdp* rdp = context->rdp;
1195
0
    const char* old = rdp_get_state_string(rdp);
1196
1197
0
    if (rc == STATE_RUN_TRY_AGAIN)
1198
0
      Stream_SetPosition(s, start);
1199
0
    rc = peer_recv_callback_internal(transport, s, extra);
1200
1201
0
    const size_t len = Stream_GetRemainingLength(s);
1202
0
    if ((len > 0) && !state_run_continue(rc))
1203
0
      level = WLOG_WARN;
1204
0
    WLog_Print(log, level,
1205
0
               "(server)[%s -> %s] current return %s [%" PRIuz " bytes not processed]", old,
1206
0
               rdp_get_state_string(rdp), state_run_result_string(rc, buffer, sizeof(buffer)),
1207
0
               len);
1208
0
  } while (state_run_continue(rc));
1209
1210
0
  return rc;
1211
0
}
1212
1213
static BOOL freerdp_peer_close(freerdp_peer* client)
1214
0
{
1215
0
  UINT32 SelectedProtocol = 0;
1216
0
  rdpContext* context = NULL;
1217
1218
0
  WINPR_ASSERT(client);
1219
1220
0
  context = client->context;
1221
0
  WINPR_ASSERT(context);
1222
0
  WINPR_ASSERT(context->settings);
1223
0
  WINPR_ASSERT(context->rdp);
1224
1225
  /** if negotiation has failed, we're not MCS connected. So don't
1226
   *  send anything else, or some mstsc will consider that as an error
1227
   */
1228
0
  SelectedProtocol = nego_get_selected_protocol(context->rdp->nego);
1229
1230
0
  if (SelectedProtocol & PROTOCOL_FAILED_NEGO)
1231
0
    return TRUE;
1232
1233
  /**
1234
   * [MS-RDPBCGR] 1.3.1.4.2 User-Initiated Disconnection Sequence on Server
1235
   * The server first sends the client a Deactivate All PDU followed by an
1236
   * optional MCS Disconnect Provider Ultimatum PDU.
1237
   */
1238
0
  if (!rdp_send_deactivate_all(context->rdp))
1239
0
    return FALSE;
1240
1241
0
  if (freerdp_settings_get_bool(context->settings, FreeRDP_SupportErrorInfoPdu))
1242
0
  {
1243
0
    if (!rdp_send_error_info(context->rdp))
1244
0
      return FALSE;
1245
0
  }
1246
1247
0
  return mcs_send_disconnect_provider_ultimatum(context->rdp->mcs,
1248
0
                                                Disconnect_Ultimatum_provider_initiated);
1249
0
}
1250
1251
static void freerdp_peer_disconnect(freerdp_peer* client)
1252
0
{
1253
0
  rdpTransport* transport = NULL;
1254
0
  WINPR_ASSERT(client);
1255
1256
0
  transport = freerdp_get_transport(client->context);
1257
0
  transport_disconnect(transport);
1258
0
}
1259
1260
static BOOL freerdp_peer_send_channel_data(freerdp_peer* client, UINT16 channelId, const BYTE* data,
1261
                                           size_t size)
1262
0
{
1263
0
  WINPR_ASSERT(client);
1264
0
  WINPR_ASSERT(client->context);
1265
0
  WINPR_ASSERT(client->context->rdp);
1266
0
  return rdp_send_channel_data(client->context->rdp, channelId, data, size);
1267
0
}
1268
1269
static BOOL freerdp_peer_send_server_redirection_pdu(freerdp_peer* peer,
1270
                                                     const rdpRedirection* redirection)
1271
0
{
1272
0
  BOOL rc = FALSE;
1273
0
  WINPR_ASSERT(peer);
1274
0
  WINPR_ASSERT(peer->context);
1275
1276
0
  UINT16 sec_flags = 0;
1277
0
  wStream* s = rdp_send_stream_pdu_init(peer->context->rdp, &sec_flags);
1278
0
  if (!s)
1279
0
    return FALSE;
1280
0
  if (!rdp_write_enhanced_security_redirection_packet(s, redirection))
1281
0
    goto fail;
1282
0
  if (!rdp_send_pdu(peer->context->rdp, s, PDU_TYPE_SERVER_REDIRECTION, 0, sec_flags))
1283
0
    goto fail;
1284
0
  rc = rdp_reset_runtime_settings(peer->context->rdp);
1285
0
fail:
1286
0
  Stream_Release(s);
1287
0
  return rc;
1288
0
}
1289
1290
static BOOL freerdp_peer_send_channel_packet(freerdp_peer* client, UINT16 channelId,
1291
                                             size_t totalSize, UINT32 flags, const BYTE* data,
1292
                                             size_t chunkSize)
1293
0
{
1294
0
  WINPR_ASSERT(client);
1295
0
  WINPR_ASSERT(client->context);
1296
0
  WINPR_ASSERT(client->context->rdp);
1297
0
  return rdp_channel_send_packet(client->context->rdp, channelId, totalSize, flags, data,
1298
0
                                 chunkSize);
1299
0
}
1300
1301
static BOOL freerdp_peer_is_write_blocked(freerdp_peer* peer)
1302
0
{
1303
0
  rdpTransport* transport = NULL;
1304
0
  WINPR_ASSERT(peer);
1305
0
  WINPR_ASSERT(peer->context);
1306
0
  WINPR_ASSERT(peer->context->rdp);
1307
0
  WINPR_ASSERT(peer->context->rdp->transport);
1308
0
  transport = peer->context->rdp->transport;
1309
0
  return transport_is_write_blocked(transport);
1310
0
}
1311
1312
static int freerdp_peer_drain_output_buffer(freerdp_peer* peer)
1313
0
{
1314
0
  rdpTransport* transport = NULL;
1315
0
  WINPR_ASSERT(peer);
1316
0
  WINPR_ASSERT(peer->context);
1317
0
  WINPR_ASSERT(peer->context->rdp);
1318
0
  WINPR_ASSERT(peer->context->rdp->transport);
1319
0
  transport = peer->context->rdp->transport;
1320
0
  return transport_drain_output_buffer(transport);
1321
0
}
1322
1323
static BOOL freerdp_peer_has_more_to_read(freerdp_peer* peer)
1324
0
{
1325
0
  WINPR_ASSERT(peer);
1326
0
  WINPR_ASSERT(peer->context);
1327
0
  WINPR_ASSERT(peer->context->rdp);
1328
0
  return transport_have_more_bytes_to_read(peer->context->rdp->transport);
1329
0
}
1330
1331
static LicenseCallbackResult freerdp_peer_nolicense(freerdp_peer* peer,
1332
                                                    WINPR_ATTR_UNUSED wStream* s)
1333
0
{
1334
0
  rdpRdp* rdp = NULL;
1335
1336
0
  WINPR_ASSERT(peer);
1337
0
  WINPR_ASSERT(peer->context);
1338
1339
0
  rdp = peer->context->rdp;
1340
1341
0
  if (!license_send_valid_client_error_packet(rdp))
1342
0
  {
1343
0
    WLog_ERR(TAG, "freerdp_peer_nolicense: license_send_valid_client_error_packet() failed");
1344
0
    return LICENSE_CB_ABORT;
1345
0
  }
1346
1347
0
  return LICENSE_CB_COMPLETED;
1348
0
}
1349
1350
BOOL freerdp_peer_context_new(freerdp_peer* client)
1351
6.40k
{
1352
6.40k
  return freerdp_peer_context_new_ex(client, NULL);
1353
6.40k
}
1354
1355
void freerdp_peer_context_free(freerdp_peer* client)
1356
6.40k
{
1357
6.40k
  if (!client)
1358
0
    return;
1359
1360
6.40k
  IFCALL(client->ContextFree, client, client->context);
1361
1362
6.40k
  if (client->context)
1363
6.40k
  {
1364
6.40k
    rdpContext* ctx = client->context;
1365
1366
6.40k
    (void)CloseHandle(ctx->channelErrorEvent);
1367
6.40k
    ctx->channelErrorEvent = NULL;
1368
6.40k
    free(ctx->errorDescription);
1369
6.40k
    ctx->errorDescription = NULL;
1370
6.40k
    rdp_free(ctx->rdp);
1371
6.40k
    ctx->rdp = NULL;
1372
6.40k
    metrics_free(ctx->metrics);
1373
6.40k
    ctx->metrics = NULL;
1374
6.40k
    stream_dump_free(ctx->dump);
1375
6.40k
    ctx->dump = NULL;
1376
6.40k
    free(ctx);
1377
6.40k
  }
1378
6.40k
  client->context = NULL;
1379
6.40k
}
1380
1381
static const char* os_major_type_to_string(UINT16 osMajorType)
1382
0
{
1383
0
  switch (osMajorType)
1384
0
  {
1385
0
    case OSMAJORTYPE_UNSPECIFIED:
1386
0
      return "Unspecified platform";
1387
0
    case OSMAJORTYPE_WINDOWS:
1388
0
      return "Windows platform";
1389
0
    case OSMAJORTYPE_OS2:
1390
0
      return "OS/2 platform";
1391
0
    case OSMAJORTYPE_MACINTOSH:
1392
0
      return "Macintosh platform";
1393
0
    case OSMAJORTYPE_UNIX:
1394
0
      return "UNIX platform";
1395
0
    case OSMAJORTYPE_IOS:
1396
0
      return "iOS platform";
1397
0
    case OSMAJORTYPE_OSX:
1398
0
      return "OS X platform";
1399
0
    case OSMAJORTYPE_ANDROID:
1400
0
      return "Android platform";
1401
0
    case OSMAJORTYPE_CHROME_OS:
1402
0
      return "Chrome OS platform";
1403
0
    default:
1404
0
      break;
1405
0
  }
1406
1407
0
  return "Unknown platform";
1408
0
}
1409
1410
const char* freerdp_peer_os_major_type_string(freerdp_peer* client)
1411
0
{
1412
0
  WINPR_ASSERT(client);
1413
1414
0
  rdpContext* context = client->context;
1415
0
  WINPR_ASSERT(context);
1416
0
  WINPR_ASSERT(context->settings);
1417
1418
0
  const UINT32 osMajorType = freerdp_settings_get_uint32(context->settings, FreeRDP_OsMajorType);
1419
0
  WINPR_ASSERT(osMajorType <= UINT16_MAX);
1420
0
  return os_major_type_to_string((UINT16)osMajorType);
1421
0
}
1422
1423
static const char* os_minor_type_to_string(UINT16 osMinorType)
1424
0
{
1425
0
  switch (osMinorType)
1426
0
  {
1427
0
    case OSMINORTYPE_UNSPECIFIED:
1428
0
      return "Unspecified version";
1429
0
    case OSMINORTYPE_WINDOWS_31X:
1430
0
      return "Windows 3.1x";
1431
0
    case OSMINORTYPE_WINDOWS_95:
1432
0
      return "Windows 95";
1433
0
    case OSMINORTYPE_WINDOWS_NT:
1434
0
      return "Windows NT";
1435
0
    case OSMINORTYPE_OS2_V21:
1436
0
      return "OS/2 2.1";
1437
0
    case OSMINORTYPE_POWER_PC:
1438
0
      return "PowerPC";
1439
0
    case OSMINORTYPE_MACINTOSH:
1440
0
      return "Macintosh";
1441
0
    case OSMINORTYPE_NATIVE_XSERVER:
1442
0
      return "Native X Server";
1443
0
    case OSMINORTYPE_PSEUDO_XSERVER:
1444
0
      return "Pseudo X Server";
1445
0
    case OSMINORTYPE_WINDOWS_RT:
1446
0
      return "Windows RT";
1447
0
    default:
1448
0
      break;
1449
0
  }
1450
1451
0
  return "Unknown version";
1452
0
}
1453
1454
const char* freerdp_peer_os_minor_type_string(freerdp_peer* client)
1455
0
{
1456
0
  WINPR_ASSERT(client);
1457
1458
0
  rdpContext* context = client->context;
1459
0
  WINPR_ASSERT(context);
1460
0
  WINPR_ASSERT(context->settings);
1461
1462
0
  const UINT32 osMinorType = freerdp_settings_get_uint32(context->settings, FreeRDP_OsMinorType);
1463
0
  WINPR_ASSERT(osMinorType <= UINT16_MAX);
1464
0
  return os_minor_type_to_string((UINT16)osMinorType);
1465
0
}
1466
1467
freerdp_peer* freerdp_peer_new(int sockfd)
1468
0
{
1469
0
  freerdp_peer* client = (freerdp_peer*)calloc(1, sizeof(freerdp_peer));
1470
1471
0
  if (!client)
1472
0
    return NULL;
1473
1474
0
  if (sockfd >= 0)
1475
0
  {
1476
0
    (void)freerdp_tcp_set_nodelay(WLog_Get(TAG), WLOG_DEBUG, sockfd);
1477
0
  }
1478
1479
0
  if (client)
1480
0
  {
1481
0
    client->sockfd = sockfd;
1482
0
    client->ContextSize = sizeof(rdpContext);
1483
0
    client->Initialize = freerdp_peer_initialize;
1484
#if defined(WITH_FREERDP_DEPRECATED)
1485
    client->GetFileDescriptor = freerdp_peer_get_fds;
1486
#endif
1487
0
    client->GetEventHandle = freerdp_peer_get_event_handle;
1488
0
    client->GetEventHandles = freerdp_peer_get_event_handles;
1489
0
    client->CheckFileDescriptor = freerdp_peer_check_fds;
1490
0
    client->Close = freerdp_peer_close;
1491
0
    client->Disconnect = freerdp_peer_disconnect;
1492
0
    client->SendChannelData = freerdp_peer_send_channel_data;
1493
0
    client->SendChannelPacket = freerdp_peer_send_channel_packet;
1494
0
    client->SendServerRedirection = freerdp_peer_send_server_redirection_pdu;
1495
0
    client->IsWriteBlocked = freerdp_peer_is_write_blocked;
1496
0
    client->DrainOutputBuffer = freerdp_peer_drain_output_buffer;
1497
0
    client->HasMoreToRead = freerdp_peer_has_more_to_read;
1498
0
    client->VirtualChannelOpen = freerdp_peer_virtual_channel_open;
1499
0
    client->VirtualChannelClose = freerdp_peer_virtual_channel_close;
1500
0
    client->VirtualChannelWrite = freerdp_peer_virtual_channel_write;
1501
0
    client->VirtualChannelRead = NULL; /* must be defined by server application */
1502
0
    client->VirtualChannelGetData = freerdp_peer_virtual_channel_get_data;
1503
0
    client->VirtualChannelSetData = freerdp_peer_virtual_channel_set_data;
1504
0
    client->SetState = freerdp_peer_set_state;
1505
0
  }
1506
1507
0
  return client;
1508
0
}
1509
1510
void freerdp_peer_free(freerdp_peer* client)
1511
0
{
1512
0
  if (!client)
1513
0
    return;
1514
1515
0
  sspi_FreeAuthIdentity(&client->identity);
1516
0
  if (client->sockfd >= 0)
1517
0
    closesocket((SOCKET)client->sockfd);
1518
0
  free(client);
1519
0
}
1520
1521
static BOOL freerdp_peer_transport_setup(freerdp_peer* client)
1522
6.40k
{
1523
6.40k
  rdpRdp* rdp = NULL;
1524
1525
6.40k
  WINPR_ASSERT(client);
1526
6.40k
  WINPR_ASSERT(client->context);
1527
1528
6.40k
  rdp = client->context->rdp;
1529
6.40k
  WINPR_ASSERT(rdp);
1530
1531
6.40k
  if (!transport_attach(rdp->transport, client->sockfd))
1532
0
    return FALSE;
1533
6.40k
  client->sockfd = -1;
1534
1535
6.40k
  if (!transport_set_recv_callbacks(rdp->transport, peer_recv_callback, client))
1536
0
    return FALSE;
1537
1538
6.40k
  if (!transport_set_blocking_mode(rdp->transport, FALSE))
1539
0
    return FALSE;
1540
1541
6.40k
  return TRUE;
1542
6.40k
}
1543
1544
BOOL freerdp_peer_context_new_ex(freerdp_peer* client, const rdpSettings* settings)
1545
6.40k
{
1546
6.40k
  rdpRdp* rdp = NULL;
1547
6.40k
  rdpContext* context = NULL;
1548
6.40k
  BOOL ret = TRUE;
1549
1550
6.40k
  if (!client)
1551
0
    return FALSE;
1552
1553
6.40k
  WINPR_ASSERT(client->ContextSize >= sizeof(rdpContext));
1554
6.40k
  if (!(context = (rdpContext*)calloc(1, client->ContextSize)))
1555
0
    goto fail;
1556
1557
6.40k
  client->context = context;
1558
6.40k
  context->peer = client;
1559
6.40k
  context->ServerMode = TRUE;
1560
6.40k
  context->log = WLog_Get(TAG);
1561
6.40k
  if (!context->log)
1562
0
    goto fail;
1563
1564
6.40k
  if (settings)
1565
0
  {
1566
0
    context->settings = freerdp_settings_clone(settings);
1567
0
    if (!context->settings)
1568
0
      goto fail;
1569
0
  }
1570
1571
6.40k
  context->dump = stream_dump_new();
1572
6.40k
  if (!context->dump)
1573
0
    goto fail;
1574
6.40k
  if (!(context->metrics = metrics_new(context)))
1575
0
    goto fail;
1576
1577
6.40k
  if (!(rdp = rdp_new(context)))
1578
0
    goto fail;
1579
1580
6.40k
  rdp_log_build_warnings(rdp);
1581
1582
#if defined(WITH_FREERDP_DEPRECATED)
1583
  client->update = rdp->update;
1584
  client->settings = rdp->settings;
1585
  client->autodetect = rdp->autodetect;
1586
#endif
1587
6.40k
  context->rdp = rdp;
1588
6.40k
  context->input = rdp->input;
1589
6.40k
  context->update = rdp->update;
1590
6.40k
  context->settings = rdp->settings;
1591
6.40k
  context->autodetect = rdp->autodetect;
1592
6.40k
  update_register_server_callbacks(rdp->update);
1593
6.40k
  autodetect_register_server_callbacks(rdp->autodetect);
1594
1595
6.40k
  if (!(context->channelErrorEvent = CreateEvent(NULL, TRUE, FALSE, NULL)))
1596
0
  {
1597
0
    WLog_ERR(TAG, "CreateEvent failed!");
1598
0
    goto fail;
1599
0
  }
1600
1601
6.40k
  if (!(context->errorDescription = calloc(1, 500)))
1602
0
  {
1603
0
    WLog_ERR(TAG, "calloc failed!");
1604
0
    goto fail;
1605
0
  }
1606
1607
6.40k
  if (!freerdp_peer_transport_setup(client))
1608
0
    goto fail;
1609
1610
6.40k
  client->IsWriteBlocked = freerdp_peer_is_write_blocked;
1611
6.40k
  client->DrainOutputBuffer = freerdp_peer_drain_output_buffer;
1612
6.40k
  client->HasMoreToRead = freerdp_peer_has_more_to_read;
1613
6.40k
  client->LicenseCallback = freerdp_peer_nolicense;
1614
6.40k
  IFCALLRET(client->ContextNew, ret, client, client->context);
1615
1616
6.40k
  if (!ret)
1617
0
    goto fail;
1618
6.40k
  return TRUE;
1619
1620
0
fail:
1621
0
  WLog_ERR(TAG, "ContextNew callback failed");
1622
0
  freerdp_peer_context_free(client);
1623
0
  return FALSE;
1624
6.40k
}