/src/FreeRDP/libfreerdp/core/peer.c
Line | Count | Source |
1 | | /** |
2 | | * FreeRDP: A Remote Desktop Protocol Implementation |
3 | | * RDP Server Peer |
4 | | * |
5 | | * Copyright 2011 Vic Lee |
6 | | * Copyright 2014 DI (FH) Martin Haimberger <martin.haimberger@thincast.com> |
7 | | * Copyright 2023 Armin Novak <anovak@thincast.com> |
8 | | * Copyright 2023 Thincast Technologies GmbH |
9 | | * |
10 | | * Licensed under the Apache License, Version 2.0 (the "License"); |
11 | | * you may not use this file except in compliance with the License. |
12 | | * You may obtain a copy of the License at |
13 | | * |
14 | | * http://www.apache.org/licenses/LICENSE-2.0 |
15 | | * |
16 | | * Unless required by applicable law or agreed to in writing, software |
17 | | * distributed under the License is distributed on an "AS IS" BASIS, |
18 | | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
19 | | * See the License for the specific language governing permissions and |
20 | | * limitations under the License. |
21 | | */ |
22 | | |
23 | | #include <freerdp/config.h> |
24 | | |
25 | | #include "settings.h" |
26 | | |
27 | | #include <winpr/assert.h> |
28 | | #include <winpr/cast.h> |
29 | | #include <winpr/crt.h> |
30 | | #include <winpr/winsock.h> |
31 | | |
32 | | #include "info.h" |
33 | | #include "display.h" |
34 | | |
35 | | #include <freerdp/log.h> |
36 | | #include <freerdp/streamdump.h> |
37 | | #include <freerdp/redirection.h> |
38 | | #include <freerdp/crypto/certificate.h> |
39 | | |
40 | | #include "rdp.h" |
41 | | #include "peer.h" |
42 | | #include "multitransport.h" |
43 | | |
44 | 6.40k | #define TAG FREERDP_TAG("core.peer") |
45 | | |
46 | | static state_run_t peer_recv_pdu(freerdp_peer* client, wStream* s); |
47 | | |
48 | | static HANDLE freerdp_peer_virtual_channel_open(freerdp_peer* client, const char* name, |
49 | | UINT32 flags) |
50 | 0 | { |
51 | 0 | UINT32 index = 0; |
52 | 0 | BOOL joined = FALSE; |
53 | 0 | rdpMcsChannel* mcsChannel = NULL; |
54 | 0 | rdpPeerChannel* peerChannel = NULL; |
55 | 0 | rdpMcs* mcs = NULL; |
56 | |
|
57 | 0 | WINPR_ASSERT(client); |
58 | 0 | WINPR_ASSERT(client->context); |
59 | 0 | WINPR_ASSERT(client->context->rdp); |
60 | 0 | WINPR_ASSERT(name); |
61 | 0 | mcs = client->context->rdp->mcs; |
62 | 0 | WINPR_ASSERT(mcs); |
63 | |
|
64 | 0 | if (flags & WTS_CHANNEL_OPTION_DYNAMIC) |
65 | 0 | return NULL; /* not yet supported */ |
66 | | |
67 | 0 | const size_t length = strnlen(name, 9); |
68 | |
|
69 | 0 | if (length > 8) |
70 | 0 | return NULL; /* SVC maximum name length is 8 */ |
71 | | |
72 | 0 | for (; index < mcs->channelCount; index++) |
73 | 0 | { |
74 | 0 | mcsChannel = &(mcs->channels[index]); |
75 | |
|
76 | 0 | if (!mcsChannel->joined) |
77 | 0 | continue; |
78 | | |
79 | 0 | if (_strnicmp(name, mcsChannel->Name, length) == 0) |
80 | 0 | { |
81 | 0 | joined = TRUE; |
82 | 0 | break; |
83 | 0 | } |
84 | 0 | } |
85 | |
|
86 | 0 | if (!joined) |
87 | 0 | return NULL; /* channel is not joined */ |
88 | | |
89 | 0 | peerChannel = (rdpPeerChannel*)mcsChannel->handle; |
90 | |
|
91 | 0 | if (peerChannel) |
92 | 0 | { |
93 | | /* channel is already open */ |
94 | 0 | return (HANDLE)peerChannel; |
95 | 0 | } |
96 | | |
97 | 0 | WINPR_ASSERT(index <= UINT16_MAX); |
98 | 0 | peerChannel = |
99 | 0 | server_channel_common_new(client, (UINT16)index, mcsChannel->ChannelId, 128, NULL, name); |
100 | |
|
101 | 0 | if (peerChannel) |
102 | 0 | { |
103 | 0 | peerChannel->channelFlags = flags; |
104 | 0 | peerChannel->mcsChannel = mcsChannel; |
105 | 0 | mcsChannel->handle = (void*)peerChannel; |
106 | 0 | } |
107 | |
|
108 | 0 | return (HANDLE)peerChannel; |
109 | 0 | } |
110 | | |
111 | | static BOOL freerdp_peer_virtual_channel_close(WINPR_ATTR_UNUSED freerdp_peer* client, |
112 | | HANDLE hChannel) |
113 | 0 | { |
114 | 0 | rdpMcsChannel* mcsChannel = NULL; |
115 | 0 | rdpPeerChannel* peerChannel = NULL; |
116 | |
|
117 | 0 | WINPR_ASSERT(client); |
118 | |
|
119 | 0 | if (!hChannel) |
120 | 0 | return FALSE; |
121 | | |
122 | 0 | peerChannel = (rdpPeerChannel*)hChannel; |
123 | 0 | mcsChannel = peerChannel->mcsChannel; |
124 | 0 | WINPR_ASSERT(mcsChannel); |
125 | 0 | mcsChannel->handle = NULL; |
126 | 0 | server_channel_common_free(peerChannel); |
127 | 0 | return TRUE; |
128 | 0 | } |
129 | | |
130 | | static int freerdp_peer_virtual_channel_write(freerdp_peer* client, HANDLE hChannel, |
131 | | const BYTE* buffer, UINT32 length) |
132 | 0 | { |
133 | 0 | wStream* s = NULL; |
134 | 0 | UINT32 flags = 0; |
135 | 0 | UINT32 chunkSize = 0; |
136 | 0 | UINT32 maxChunkSize = 0; |
137 | 0 | UINT32 totalLength = 0; |
138 | 0 | rdpPeerChannel* peerChannel = NULL; |
139 | 0 | rdpMcsChannel* mcsChannel = NULL; |
140 | 0 | rdpRdp* rdp = NULL; |
141 | |
|
142 | 0 | WINPR_ASSERT(client); |
143 | 0 | WINPR_ASSERT(client->context); |
144 | |
|
145 | 0 | rdp = client->context->rdp; |
146 | 0 | WINPR_ASSERT(rdp); |
147 | 0 | WINPR_ASSERT(rdp->settings); |
148 | |
|
149 | 0 | if (!hChannel) |
150 | 0 | return -1; |
151 | | |
152 | 0 | peerChannel = (rdpPeerChannel*)hChannel; |
153 | 0 | mcsChannel = peerChannel->mcsChannel; |
154 | 0 | WINPR_ASSERT(peerChannel); |
155 | 0 | WINPR_ASSERT(mcsChannel); |
156 | 0 | if (peerChannel->channelFlags & WTS_CHANNEL_OPTION_DYNAMIC) |
157 | 0 | return -1; /* not yet supported */ |
158 | | |
159 | 0 | maxChunkSize = rdp->settings->VCChunkSize; |
160 | 0 | totalLength = length; |
161 | 0 | flags = CHANNEL_FLAG_FIRST; |
162 | |
|
163 | 0 | while (length > 0) |
164 | 0 | { |
165 | 0 | UINT16 sec_flags = 0; |
166 | 0 | s = rdp_send_stream_init(rdp, &sec_flags); |
167 | |
|
168 | 0 | if (!s) |
169 | 0 | return -1; |
170 | | |
171 | 0 | if (length > maxChunkSize) |
172 | 0 | { |
173 | 0 | chunkSize = rdp->settings->VCChunkSize; |
174 | 0 | } |
175 | 0 | else |
176 | 0 | { |
177 | 0 | chunkSize = length; |
178 | 0 | flags |= CHANNEL_FLAG_LAST; |
179 | 0 | } |
180 | |
|
181 | 0 | if (mcsChannel->options & CHANNEL_OPTION_SHOW_PROTOCOL) |
182 | 0 | flags |= CHANNEL_FLAG_SHOW_PROTOCOL; |
183 | |
|
184 | 0 | Stream_Write_UINT32(s, totalLength); |
185 | 0 | Stream_Write_UINT32(s, flags); |
186 | |
|
187 | 0 | if (!Stream_EnsureRemainingCapacity(s, chunkSize)) |
188 | 0 | { |
189 | 0 | Stream_Release(s); |
190 | 0 | return -1; |
191 | 0 | } |
192 | | |
193 | 0 | Stream_Write(s, buffer, chunkSize); |
194 | |
|
195 | 0 | WINPR_ASSERT(peerChannel->channelId <= UINT16_MAX); |
196 | 0 | if (!rdp_send(rdp, s, (UINT16)peerChannel->channelId, sec_flags)) |
197 | 0 | return -1; |
198 | | |
199 | 0 | buffer += chunkSize; |
200 | 0 | length -= chunkSize; |
201 | 0 | flags = 0; |
202 | 0 | } |
203 | | |
204 | 0 | return 1; |
205 | 0 | } |
206 | | |
207 | | static void* freerdp_peer_virtual_channel_get_data(WINPR_ATTR_UNUSED freerdp_peer* client, |
208 | | HANDLE hChannel) |
209 | 0 | { |
210 | 0 | rdpPeerChannel* peerChannel = (rdpPeerChannel*)hChannel; |
211 | |
|
212 | 0 | WINPR_ASSERT(client); |
213 | 0 | if (!hChannel) |
214 | 0 | return NULL; |
215 | | |
216 | 0 | return peerChannel->extra; |
217 | 0 | } |
218 | | |
219 | | static int freerdp_peer_virtual_channel_set_data(WINPR_ATTR_UNUSED freerdp_peer* client, |
220 | | HANDLE hChannel, void* data) |
221 | 0 | { |
222 | 0 | rdpPeerChannel* peerChannel = (rdpPeerChannel*)hChannel; |
223 | |
|
224 | 0 | WINPR_ASSERT(client); |
225 | 0 | if (!hChannel) |
226 | 0 | return -1; |
227 | | |
228 | 0 | peerChannel->extra = data; |
229 | 0 | return 1; |
230 | 0 | } |
231 | | |
232 | | static BOOL freerdp_peer_set_state(freerdp_peer* client, CONNECTION_STATE state) |
233 | 0 | { |
234 | 0 | WINPR_ASSERT(client); |
235 | 0 | WINPR_ASSERT(client->context); |
236 | 0 | return rdp_server_transition_to_state(client->context->rdp, state); |
237 | 0 | } |
238 | | |
239 | | static BOOL freerdp_peer_initialize(freerdp_peer* client) |
240 | 0 | { |
241 | 0 | rdpRdp* rdp = NULL; |
242 | 0 | rdpSettings* settings = NULL; |
243 | |
|
244 | 0 | WINPR_ASSERT(client); |
245 | 0 | WINPR_ASSERT(client->context); |
246 | |
|
247 | 0 | rdp = client->context->rdp; |
248 | 0 | WINPR_ASSERT(rdp); |
249 | |
|
250 | 0 | settings = rdp->settings; |
251 | 0 | WINPR_ASSERT(settings); |
252 | |
|
253 | 0 | settings->ServerMode = TRUE; |
254 | 0 | settings->FrameAcknowledge = 0; |
255 | 0 | settings->LocalConnection = client->local; |
256 | |
|
257 | 0 | const rdpCertificate* cert = |
258 | 0 | freerdp_settings_get_pointer(settings, FreeRDP_RdpServerCertificate); |
259 | 0 | if (!cert) |
260 | 0 | { |
261 | 0 | WLog_ERR(TAG, "Missing server certificate, can not continue."); |
262 | 0 | return FALSE; |
263 | 0 | } |
264 | | |
265 | 0 | if (freerdp_settings_get_bool(settings, FreeRDP_RdpSecurity)) |
266 | 0 | { |
267 | |
|
268 | 0 | if (!freerdp_certificate_is_rdp_security_compatible(cert)) |
269 | 0 | { |
270 | 0 | if (!freerdp_settings_set_bool(settings, FreeRDP_RdpSecurity, FALSE)) |
271 | 0 | return FALSE; |
272 | 0 | if (!freerdp_settings_set_bool(settings, FreeRDP_UseRdpSecurityLayer, FALSE)) |
273 | 0 | return FALSE; |
274 | 0 | } |
275 | 0 | } |
276 | | |
277 | 0 | nego_set_RCG_supported(rdp->nego, settings->RemoteCredentialGuard); |
278 | 0 | nego_set_restricted_admin_mode_supported(rdp->nego, settings->RestrictedAdminModeSupported); |
279 | |
|
280 | 0 | if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_INITIAL)) |
281 | 0 | return FALSE; |
282 | | |
283 | 0 | return TRUE; |
284 | 0 | } |
285 | | |
286 | | #if defined(WITH_FREERDP_DEPRECATED) |
287 | | static BOOL freerdp_peer_get_fds(freerdp_peer* client, void** rfds, int* rcount) |
288 | | { |
289 | | rdpTransport* transport = NULL; |
290 | | WINPR_ASSERT(client); |
291 | | WINPR_ASSERT(client->context); |
292 | | WINPR_ASSERT(client->context->rdp); |
293 | | |
294 | | transport = client->context->rdp->transport; |
295 | | WINPR_ASSERT(transport); |
296 | | transport_get_fds(transport, rfds, rcount); |
297 | | return TRUE; |
298 | | } |
299 | | #endif |
300 | | |
301 | | static HANDLE freerdp_peer_get_event_handle(freerdp_peer* client) |
302 | 0 | { |
303 | 0 | HANDLE hEvent = NULL; |
304 | 0 | rdpTransport* transport = NULL; |
305 | 0 | WINPR_ASSERT(client); |
306 | 0 | WINPR_ASSERT(client->context); |
307 | 0 | WINPR_ASSERT(client->context->rdp); |
308 | |
|
309 | 0 | transport = client->context->rdp->transport; |
310 | 0 | hEvent = transport_get_front_bio(transport); |
311 | 0 | return hEvent; |
312 | 0 | } |
313 | | |
314 | | static DWORD freerdp_peer_get_event_handles(freerdp_peer* client, HANDLE* events, DWORD count) |
315 | 0 | { |
316 | 0 | WINPR_ASSERT(client); |
317 | 0 | WINPR_ASSERT(client->context); |
318 | 0 | WINPR_ASSERT(client->context->rdp); |
319 | 0 | return transport_get_event_handles(client->context->rdp->transport, events, count); |
320 | 0 | } |
321 | | |
322 | | static BOOL freerdp_peer_check_fds(freerdp_peer* peer) |
323 | 0 | { |
324 | 0 | int status = 0; |
325 | 0 | rdpRdp* rdp = NULL; |
326 | |
|
327 | 0 | WINPR_ASSERT(peer); |
328 | 0 | WINPR_ASSERT(peer->context); |
329 | |
|
330 | 0 | rdp = peer->context->rdp; |
331 | 0 | status = rdp_check_fds(rdp); |
332 | |
|
333 | 0 | if (status < 0) |
334 | 0 | return FALSE; |
335 | | |
336 | 0 | return TRUE; |
337 | 0 | } |
338 | | |
339 | | static state_run_t peer_recv_data_pdu(freerdp_peer* client, wStream* s, |
340 | | WINPR_ATTR_UNUSED UINT16 totalLength) |
341 | 0 | { |
342 | 0 | BYTE type = 0; |
343 | 0 | UINT16 length = 0; |
344 | 0 | UINT32 share_id = 0; |
345 | 0 | BYTE compressed_type = 0; |
346 | 0 | UINT16 compressed_len = 0; |
347 | 0 | rdpUpdate* update = NULL; |
348 | |
|
349 | 0 | WINPR_ASSERT(s); |
350 | 0 | WINPR_ASSERT(client); |
351 | 0 | WINPR_ASSERT(client->context); |
352 | 0 | rdpRdp* rdp = client->context->rdp; |
353 | 0 | WINPR_ASSERT(rdp); |
354 | 0 | WINPR_ASSERT(rdp->mcs); |
355 | |
|
356 | 0 | update = client->context->update; |
357 | 0 | WINPR_ASSERT(update); |
358 | |
|
359 | 0 | if (!rdp_read_share_data_header(rdp, s, &length, &type, &share_id, &compressed_type, |
360 | 0 | &compressed_len)) |
361 | 0 | return STATE_RUN_FAILED; |
362 | | |
363 | | #ifdef WITH_DEBUG_RDP |
364 | | WLog_Print(rdp->log, WLOG_DEBUG, "recv %s Data PDU (0x%02" PRIX8 "), length: %" PRIu16 "", |
365 | | data_pdu_type_to_string(type), type, length); |
366 | | #endif |
367 | | |
368 | 0 | switch (type) |
369 | 0 | { |
370 | 0 | case DATA_PDU_TYPE_SYNCHRONIZE: |
371 | 0 | if (!rdp_recv_client_synchronize_pdu(rdp, s)) |
372 | 0 | return STATE_RUN_FAILED; |
373 | | |
374 | 0 | break; |
375 | | |
376 | 0 | case DATA_PDU_TYPE_CONTROL: |
377 | 0 | if (!rdp_server_accept_client_control_pdu(rdp, s)) |
378 | 0 | return STATE_RUN_FAILED; |
379 | | |
380 | 0 | break; |
381 | | |
382 | 0 | case DATA_PDU_TYPE_INPUT: |
383 | 0 | if (!input_recv(rdp->input, s)) |
384 | 0 | return STATE_RUN_FAILED; |
385 | | |
386 | 0 | break; |
387 | | |
388 | 0 | case DATA_PDU_TYPE_BITMAP_CACHE_PERSISTENT_LIST: |
389 | 0 | if (!rdp_server_accept_client_persistent_key_list_pdu(rdp, s)) |
390 | 0 | return STATE_RUN_FAILED; |
391 | 0 | break; |
392 | | |
393 | 0 | case DATA_PDU_TYPE_FONT_LIST: |
394 | 0 | if (!rdp_server_accept_client_font_list_pdu(rdp, s)) |
395 | 0 | return STATE_RUN_FAILED; |
396 | | |
397 | 0 | return STATE_RUN_CONTINUE; // State changed, trigger rerun |
398 | | |
399 | 0 | case DATA_PDU_TYPE_SHUTDOWN_REQUEST: |
400 | 0 | mcs_send_disconnect_provider_ultimatum(rdp->mcs, |
401 | 0 | Disconnect_Ultimatum_provider_initiated); |
402 | 0 | WLog_WARN(TAG, "disconnect provider ultimatum sent to peer, closing connection"); |
403 | 0 | return STATE_RUN_QUIT_SESSION; |
404 | | |
405 | 0 | case DATA_PDU_TYPE_FRAME_ACKNOWLEDGE: |
406 | 0 | if (!Stream_CheckAndLogRequiredLength(TAG, s, 4)) |
407 | 0 | return STATE_RUN_FAILED; |
408 | | |
409 | 0 | Stream_Read_UINT32(s, client->ack_frame_id); |
410 | 0 | if (update->SurfaceFrameAcknowledge) |
411 | 0 | { |
412 | 0 | if (!update->SurfaceFrameAcknowledge(update->context, client->ack_frame_id)) |
413 | 0 | return STATE_RUN_FAILED; |
414 | 0 | } |
415 | 0 | break; |
416 | | |
417 | 0 | case DATA_PDU_TYPE_REFRESH_RECT: |
418 | 0 | if (!update_read_refresh_rect(update, s)) |
419 | 0 | return STATE_RUN_FAILED; |
420 | | |
421 | 0 | break; |
422 | | |
423 | 0 | case DATA_PDU_TYPE_SUPPRESS_OUTPUT: |
424 | 0 | if (!update_read_suppress_output(update, s)) |
425 | 0 | return STATE_RUN_FAILED; |
426 | | |
427 | 0 | break; |
428 | | |
429 | 0 | default: |
430 | 0 | WLog_ERR(TAG, "Data PDU type %" PRIu8 "", type); |
431 | 0 | break; |
432 | 0 | } |
433 | | |
434 | 0 | return STATE_RUN_SUCCESS; |
435 | 0 | } |
436 | | |
437 | | static state_run_t peer_recv_tpkt_pdu(freerdp_peer* client, wStream* s) |
438 | 0 | { |
439 | 0 | state_run_t rc = STATE_RUN_SUCCESS; |
440 | 0 | UINT16 length = 0; |
441 | 0 | UINT16 pduType = 0; |
442 | 0 | UINT16 pduSource = 0; |
443 | 0 | UINT16 channelId = 0; |
444 | 0 | UINT16 securityFlags = 0; |
445 | |
|
446 | 0 | WINPR_ASSERT(s); |
447 | 0 | WINPR_ASSERT(client); |
448 | 0 | WINPR_ASSERT(client->context); |
449 | |
|
450 | 0 | rdpRdp* rdp = client->context->rdp; |
451 | 0 | WINPR_ASSERT(rdp); |
452 | 0 | WINPR_ASSERT(rdp->mcs); |
453 | |
|
454 | 0 | rdpSettings* settings = client->context->settings; |
455 | 0 | WINPR_ASSERT(settings); |
456 | |
|
457 | 0 | if (!rdp_read_header(rdp, s, &length, &channelId)) |
458 | 0 | return STATE_RUN_FAILED; |
459 | | |
460 | 0 | rdp->inPackets++; |
461 | 0 | if (freerdp_shall_disconnect_context(rdp->context)) |
462 | 0 | return STATE_RUN_SUCCESS; |
463 | | |
464 | 0 | if (rdp_get_state(rdp) <= CONNECTION_STATE_LICENSING) |
465 | 0 | { |
466 | 0 | return rdp_handle_message_channel(rdp, s, channelId, length); |
467 | 0 | } |
468 | | |
469 | 0 | if (!rdp_handle_optional_rdp_decryption(rdp, s, &length, &securityFlags)) |
470 | 0 | return STATE_RUN_FAILED; |
471 | | |
472 | 0 | if (channelId == MCS_GLOBAL_CHANNEL_ID) |
473 | 0 | { |
474 | 0 | char buffer[256] = WINPR_C_ARRAY_INIT; |
475 | 0 | UINT16 pduLength = 0; |
476 | 0 | UINT16 remain = 0; |
477 | 0 | if (!rdp_read_share_control_header(rdp, s, &pduLength, &remain, &pduType, &pduSource)) |
478 | 0 | return STATE_RUN_FAILED; |
479 | | |
480 | 0 | settings->PduSource = pduSource; |
481 | |
|
482 | 0 | WLog_DBG(TAG, "Received %s", pdu_type_to_str(pduType, buffer, sizeof(buffer))); |
483 | 0 | switch (pduType) |
484 | 0 | { |
485 | 0 | case PDU_TYPE_DATA: |
486 | 0 | rc = peer_recv_data_pdu(client, s, pduLength); |
487 | 0 | break; |
488 | | |
489 | 0 | case PDU_TYPE_CONFIRM_ACTIVE: |
490 | 0 | if (!rdp_server_accept_confirm_active(rdp, s, pduLength)) |
491 | 0 | return STATE_RUN_FAILED; |
492 | | |
493 | 0 | break; |
494 | | |
495 | 0 | case PDU_TYPE_FLOW_RESPONSE: |
496 | 0 | case PDU_TYPE_FLOW_STOP: |
497 | 0 | case PDU_TYPE_FLOW_TEST: |
498 | 0 | if (!Stream_SafeSeek(s, remain)) |
499 | 0 | { |
500 | 0 | WLog_WARN(TAG, "Short PDU, need %" PRIu16 " bytes, got %" PRIuz, remain, |
501 | 0 | Stream_GetRemainingLength(s)); |
502 | 0 | return STATE_RUN_FAILED; |
503 | 0 | } |
504 | 0 | break; |
505 | | |
506 | 0 | default: |
507 | 0 | WLog_ERR(TAG, "Client sent unknown pduType %" PRIu16 "", pduType); |
508 | 0 | return STATE_RUN_FAILED; |
509 | 0 | } |
510 | 0 | } |
511 | 0 | else if ((rdp->mcs->messageChannelId > 0) && (channelId == rdp->mcs->messageChannelId)) |
512 | 0 | { |
513 | 0 | if (!settings->UseRdpSecurityLayer) |
514 | 0 | { |
515 | 0 | if (!rdp_read_security_header(rdp, s, &securityFlags, NULL)) |
516 | 0 | return STATE_RUN_FAILED; |
517 | 0 | } |
518 | | |
519 | 0 | return rdp_recv_message_channel_pdu(rdp, s, securityFlags); |
520 | 0 | } |
521 | 0 | else |
522 | 0 | { |
523 | 0 | if (!freerdp_channel_peer_process(client, s, channelId)) |
524 | 0 | return STATE_RUN_FAILED; |
525 | 0 | } |
526 | 0 | if (!tpkt_ensure_stream_consumed(rdp->log, s, length)) |
527 | 0 | return STATE_RUN_FAILED; |
528 | | |
529 | 0 | return rc; |
530 | 0 | } |
531 | | |
532 | | static state_run_t peer_recv_handle_auto_detect(freerdp_peer* client, wStream* s) |
533 | 0 | { |
534 | 0 | state_run_t ret = STATE_RUN_FAILED; |
535 | 0 | rdpRdp* rdp = NULL; |
536 | |
|
537 | 0 | WINPR_ASSERT(client); |
538 | 0 | WINPR_ASSERT(s); |
539 | 0 | WINPR_ASSERT(client->context); |
540 | |
|
541 | 0 | rdp = client->context->rdp; |
542 | 0 | WINPR_ASSERT(rdp); |
543 | |
|
544 | 0 | const rdpSettings* settings = client->context->settings; |
545 | 0 | WINPR_ASSERT(settings); |
546 | |
|
547 | 0 | if (freerdp_settings_get_bool(settings, FreeRDP_NetworkAutoDetect)) |
548 | 0 | { |
549 | 0 | switch (rdp_get_state(rdp)) |
550 | 0 | { |
551 | 0 | case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_REQUEST: |
552 | 0 | autodetect_on_connect_time_auto_detect_begin(rdp->autodetect); |
553 | 0 | switch (autodetect_get_state(rdp->autodetect)) |
554 | 0 | { |
555 | 0 | case FREERDP_AUTODETECT_STATE_REQUEST: |
556 | 0 | ret = STATE_RUN_SUCCESS; |
557 | 0 | if (!rdp_server_transition_to_state( |
558 | 0 | rdp, CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_RESPONSE)) |
559 | 0 | return STATE_RUN_FAILED; |
560 | 0 | break; |
561 | 0 | case FREERDP_AUTODETECT_STATE_COMPLETE: |
562 | 0 | ret = STATE_RUN_CONTINUE; /* Rerun in next state */ |
563 | 0 | if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_LICENSING)) |
564 | 0 | return STATE_RUN_FAILED; |
565 | 0 | break; |
566 | 0 | default: |
567 | 0 | break; |
568 | 0 | } |
569 | 0 | break; |
570 | 0 | case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_RESPONSE: |
571 | 0 | ret = peer_recv_pdu(client, s); |
572 | 0 | if (state_run_success(ret)) |
573 | 0 | { |
574 | 0 | autodetect_on_connect_time_auto_detect_progress(rdp->autodetect); |
575 | 0 | switch (autodetect_get_state(rdp->autodetect)) |
576 | 0 | { |
577 | 0 | case FREERDP_AUTODETECT_STATE_REQUEST: |
578 | 0 | ret = STATE_RUN_SUCCESS; |
579 | 0 | break; |
580 | 0 | case FREERDP_AUTODETECT_STATE_COMPLETE: |
581 | 0 | ret = STATE_RUN_CONTINUE; /* Rerun in next state */ |
582 | 0 | if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_LICENSING)) |
583 | 0 | return STATE_RUN_FAILED; |
584 | 0 | break; |
585 | 0 | default: |
586 | 0 | break; |
587 | 0 | } |
588 | 0 | } |
589 | 0 | break; |
590 | 0 | default: |
591 | 0 | WINPR_ASSERT(FALSE); |
592 | 0 | break; |
593 | 0 | } |
594 | 0 | } |
595 | 0 | else |
596 | 0 | { |
597 | 0 | if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_LICENSING)) |
598 | 0 | return STATE_RUN_FAILED; |
599 | | |
600 | 0 | ret = STATE_RUN_CONTINUE; /* Rerun in next state */ |
601 | 0 | } |
602 | | |
603 | 0 | return ret; |
604 | 0 | } |
605 | | |
606 | | static state_run_t peer_recv_handle_licensing(freerdp_peer* client, wStream* s) |
607 | 0 | { |
608 | 0 | state_run_t ret = STATE_RUN_FAILED; |
609 | 0 | rdpRdp* rdp = NULL; |
610 | 0 | rdpSettings* settings = NULL; |
611 | |
|
612 | 0 | WINPR_ASSERT(client); |
613 | 0 | WINPR_ASSERT(s); |
614 | 0 | WINPR_ASSERT(client->context); |
615 | |
|
616 | 0 | rdp = client->context->rdp; |
617 | 0 | WINPR_ASSERT(rdp); |
618 | |
|
619 | 0 | settings = rdp->settings; |
620 | 0 | WINPR_ASSERT(settings); |
621 | |
|
622 | 0 | switch (license_get_state(rdp->license)) |
623 | 0 | { |
624 | 0 | case LICENSE_STATE_INITIAL: |
625 | 0 | { |
626 | 0 | const BOOL required = |
627 | 0 | freerdp_settings_get_bool(settings, FreeRDP_ServerLicenseRequired); |
628 | |
|
629 | 0 | if (required) |
630 | 0 | { |
631 | 0 | if (!license_server_configure(rdp->license)) |
632 | 0 | ret = STATE_RUN_FAILED; |
633 | 0 | else if (!license_server_send_request(rdp->license)) |
634 | 0 | ret = STATE_RUN_FAILED; |
635 | 0 | else |
636 | 0 | ret = STATE_RUN_SUCCESS; |
637 | 0 | } |
638 | 0 | else |
639 | 0 | { |
640 | 0 | if (license_send_valid_client_error_packet(rdp)) |
641 | 0 | ret = STATE_RUN_CONTINUE; /* Rerun in next state, might be capabilities */ |
642 | 0 | } |
643 | 0 | } |
644 | 0 | break; |
645 | 0 | case LICENSE_STATE_COMPLETED: |
646 | 0 | ret = STATE_RUN_CONTINUE; /* Licensing completed, continue in next state */ |
647 | 0 | break; |
648 | 0 | case LICENSE_STATE_ABORTED: |
649 | 0 | ret = STATE_RUN_FAILED; |
650 | 0 | break; |
651 | 0 | default: |
652 | 0 | ret = peer_recv_pdu(client, s); |
653 | 0 | break; |
654 | 0 | } |
655 | | |
656 | 0 | return ret; |
657 | 0 | } |
658 | | |
659 | | static state_run_t peer_recv_fastpath_pdu(freerdp_peer* client, wStream* s) |
660 | 0 | { |
661 | 0 | rdpRdp* rdp = NULL; |
662 | 0 | UINT16 length = 0; |
663 | 0 | BOOL rc = 0; |
664 | 0 | rdpFastPath* fastpath = NULL; |
665 | |
|
666 | 0 | WINPR_ASSERT(s); |
667 | 0 | WINPR_ASSERT(client); |
668 | 0 | WINPR_ASSERT(client->context); |
669 | |
|
670 | 0 | rdp = client->context->rdp; |
671 | 0 | WINPR_ASSERT(rdp); |
672 | |
|
673 | 0 | fastpath = rdp->fastpath; |
674 | 0 | WINPR_ASSERT(fastpath); |
675 | |
|
676 | 0 | rc = fastpath_read_header_rdp(fastpath, s, &length); |
677 | |
|
678 | 0 | if (!rc || (length == 0)) |
679 | 0 | { |
680 | 0 | WLog_ERR(TAG, "incorrect FastPath PDU header length %" PRIu16 "", length); |
681 | 0 | return STATE_RUN_FAILED; |
682 | 0 | } |
683 | 0 | if (!Stream_CheckAndLogRequiredLength(TAG, s, length)) |
684 | 0 | return STATE_RUN_FAILED; |
685 | | |
686 | 0 | if (!fastpath_decrypt(fastpath, s, &length)) |
687 | 0 | return STATE_RUN_FAILED; |
688 | | |
689 | 0 | rdp->inPackets++; |
690 | |
|
691 | 0 | return fastpath_recv_inputs(fastpath, s); |
692 | 0 | } |
693 | | |
694 | | state_run_t peer_recv_pdu(freerdp_peer* client, wStream* s) |
695 | 0 | { |
696 | 0 | int rc = tpkt_verify_header(s); |
697 | |
|
698 | 0 | if (rc > 0) |
699 | 0 | return peer_recv_tpkt_pdu(client, s); |
700 | 0 | else if (rc == 0) |
701 | 0 | return peer_recv_fastpath_pdu(client, s); |
702 | 0 | else |
703 | 0 | return STATE_RUN_FAILED; |
704 | 0 | } |
705 | | |
706 | | static state_run_t peer_unexpected_client_message(rdpRdp* rdp, UINT32 flag) |
707 | 0 | { |
708 | 0 | char buffer[1024] = WINPR_C_ARRAY_INIT; |
709 | 0 | WLog_WARN(TAG, "Unexpected client message in state %s, missing flag %s", |
710 | 0 | rdp_get_state_string(rdp), rdp_finalize_flags_to_str(flag, buffer, sizeof(buffer))); |
711 | 0 | return STATE_RUN_SUCCESS; /* we ignore this as per spec input PDU are already allowed */ |
712 | 0 | } |
713 | | |
714 | | state_run_t rdp_peer_handle_state_demand_active(freerdp_peer* client) |
715 | 0 | { |
716 | 0 | state_run_t ret = STATE_RUN_FAILED; |
717 | |
|
718 | 0 | WINPR_ASSERT(client); |
719 | 0 | WINPR_ASSERT(client->context); |
720 | |
|
721 | 0 | rdpRdp* rdp = client->context->rdp; |
722 | 0 | WINPR_ASSERT(rdp); |
723 | |
|
724 | 0 | if (client->Capabilities && !client->Capabilities(client)) |
725 | 0 | { |
726 | 0 | WLog_ERR(TAG, "[%s] freerdp_peer::Capabilities() callback failed", |
727 | 0 | rdp_get_state_string(rdp)); |
728 | 0 | } |
729 | 0 | else if (!rdp_send_demand_active(rdp)) |
730 | 0 | { |
731 | 0 | WLog_ERR(TAG, "[%s] rdp_send_demand_active() fail", rdp_get_state_string(rdp)); |
732 | 0 | } |
733 | 0 | else |
734 | 0 | { |
735 | 0 | if (!rdp_server_transition_to_state(rdp, |
736 | 0 | CONNECTION_STATE_CAPABILITIES_EXCHANGE_MONITOR_LAYOUT)) |
737 | 0 | return STATE_RUN_FAILED; |
738 | 0 | ret = STATE_RUN_CONTINUE; |
739 | 0 | } |
740 | 0 | return ret; |
741 | 0 | } |
742 | | |
743 | | /** \brief Handle server peer state ACTIVE: |
744 | | * On initial run (not connected, not activated) do not read data |
745 | | * |
746 | | * \return -1 in case of an error, 0 if no data needs to be processed, 1 to let |
747 | | * the state machine run again and 2 if peer_recv_pdu must be called. |
748 | | */ |
749 | | static state_run_t rdp_peer_handle_state_active(freerdp_peer* client) |
750 | 0 | { |
751 | 0 | state_run_t ret = STATE_RUN_FAILED; |
752 | |
|
753 | 0 | WINPR_ASSERT(client); |
754 | 0 | WINPR_ASSERT(client->context); |
755 | |
|
756 | 0 | if (!client->connected) |
757 | 0 | { |
758 | | /** |
759 | | * PostConnect should only be called once and should not |
760 | | * be called after a reactivation sequence. |
761 | | */ |
762 | 0 | IFCALLRET(client->PostConnect, client->connected, client); |
763 | 0 | } |
764 | 0 | if (!client->connected) |
765 | 0 | { |
766 | 0 | WLog_ERR(TAG, "PostConnect for peer %p failed", WINPR_CXX_COMPAT_CAST(const void*, client)); |
767 | 0 | ret = STATE_RUN_FAILED; |
768 | 0 | } |
769 | 0 | else if (!client->activated) |
770 | 0 | { |
771 | 0 | BOOL activated = TRUE; |
772 | | |
773 | | /* Set client->activated TRUE before calling the Activate callback. |
774 | | * the Activate callback might reset the client->activated flag even if it returns success |
775 | | * (e.g. deactivate/reactivate sequence) */ |
776 | 0 | client->activated = TRUE; |
777 | 0 | IFCALLRET(client->Activate, activated, client); |
778 | |
|
779 | 0 | if (!activated) |
780 | 0 | { |
781 | 0 | WLog_ERR(TAG, "Activate for peer %p failed", |
782 | 0 | WINPR_CXX_COMPAT_CAST(const void*, client)); |
783 | 0 | ret = STATE_RUN_FAILED; |
784 | 0 | } |
785 | 0 | else |
786 | 0 | ret = STATE_RUN_SUCCESS; |
787 | 0 | } |
788 | 0 | else |
789 | 0 | ret = STATE_RUN_ACTIVE; |
790 | 0 | return ret; |
791 | 0 | } |
792 | | |
793 | | static state_run_t peer_recv_callback_internal(WINPR_ATTR_UNUSED rdpTransport* transport, |
794 | | wStream* s, void* extra) |
795 | 0 | { |
796 | 0 | freerdp_peer* client = (freerdp_peer*)extra; |
797 | 0 | state_run_t ret = STATE_RUN_FAILED; |
798 | |
|
799 | 0 | WINPR_ASSERT(transport); |
800 | 0 | WINPR_ASSERT(client); |
801 | 0 | WINPR_ASSERT(client->context); |
802 | |
|
803 | 0 | rdpRdp* rdp = client->context->rdp; |
804 | 0 | WINPR_ASSERT(rdp); |
805 | |
|
806 | 0 | rdpSettings* settings = client->context->settings; |
807 | 0 | WINPR_ASSERT(settings); |
808 | |
|
809 | 0 | if (client->ReachedState) |
810 | 0 | { |
811 | 0 | if (!client->ReachedState(client, rdp_get_state(rdp))) |
812 | 0 | return STATE_RUN_FAILED; |
813 | 0 | } |
814 | 0 | switch (rdp_get_state(rdp)) |
815 | 0 | { |
816 | 0 | case CONNECTION_STATE_INITIAL: |
817 | 0 | if (!freerdp_settings_enforce_consistency(settings)) |
818 | 0 | ret = STATE_RUN_FAILED; |
819 | 0 | else if (rdp_server_transition_to_state(rdp, CONNECTION_STATE_NEGO)) |
820 | 0 | ret = STATE_RUN_CONTINUE; |
821 | 0 | break; |
822 | | |
823 | 0 | case CONNECTION_STATE_NEGO: |
824 | 0 | if (!rdp_server_accept_nego(rdp, s)) |
825 | 0 | { |
826 | 0 | WLog_ERR(TAG, "%s - rdp_server_accept_nego() fail", rdp_get_state_string(rdp)); |
827 | 0 | } |
828 | 0 | else |
829 | 0 | { |
830 | 0 | const UINT32 SelectedProtocol = nego_get_selected_protocol(rdp->nego); |
831 | |
|
832 | 0 | settings->RdstlsSecurity = (SelectedProtocol & PROTOCOL_RDSTLS) ? TRUE : FALSE; |
833 | 0 | settings->NlaSecurity = (SelectedProtocol & PROTOCOL_HYBRID) ? TRUE : FALSE; |
834 | 0 | settings->TlsSecurity = (SelectedProtocol & PROTOCOL_SSL) ? TRUE : FALSE; |
835 | 0 | settings->RdpSecurity = (SelectedProtocol == PROTOCOL_RDP) ? TRUE : FALSE; |
836 | |
|
837 | 0 | client->authenticated = FALSE; |
838 | 0 | if (SelectedProtocol & PROTOCOL_HYBRID) |
839 | 0 | { |
840 | 0 | SEC_WINNT_AUTH_IDENTITY_INFO* identity = |
841 | 0 | (SEC_WINNT_AUTH_IDENTITY_INFO*)nego_get_identity(rdp->nego); |
842 | 0 | if (sspi_CopyAuthIdentity(&client->identity, identity) >= 0) |
843 | 0 | { |
844 | 0 | client->authenticated = |
845 | 0 | IFCALLRESULT(TRUE, client->Logon, client, &client->identity, TRUE); |
846 | 0 | } |
847 | 0 | nego_free_nla(rdp->nego); |
848 | 0 | } |
849 | 0 | else |
850 | 0 | { |
851 | 0 | client->authenticated = |
852 | 0 | IFCALLRESULT(TRUE, client->Logon, client, &client->identity, FALSE); |
853 | 0 | } |
854 | 0 | if (!client->authenticated) |
855 | 0 | ret = STATE_RUN_FAILED; |
856 | 0 | else |
857 | 0 | { |
858 | 0 | if (rdp_server_transition_to_state(rdp, CONNECTION_STATE_MCS_CREATE_REQUEST)) |
859 | 0 | ret = STATE_RUN_SUCCESS; |
860 | 0 | } |
861 | 0 | } |
862 | 0 | break; |
863 | | |
864 | 0 | case CONNECTION_STATE_NLA: |
865 | 0 | WINPR_ASSERT(FALSE); // TODO |
866 | 0 | break; |
867 | | |
868 | 0 | case CONNECTION_STATE_MCS_CREATE_REQUEST: |
869 | 0 | if (!rdp_server_accept_mcs_connect_initial(rdp, s)) |
870 | 0 | { |
871 | 0 | WLog_ERR(TAG, |
872 | 0 | "%s - " |
873 | 0 | "rdp_server_accept_mcs_connect_initial() fail", |
874 | 0 | rdp_get_state_string(rdp)); |
875 | 0 | } |
876 | 0 | else |
877 | 0 | ret = STATE_RUN_SUCCESS; |
878 | |
|
879 | 0 | break; |
880 | | |
881 | 0 | case CONNECTION_STATE_MCS_ERECT_DOMAIN: |
882 | 0 | if (!rdp_server_accept_mcs_erect_domain_request(rdp, s)) |
883 | 0 | { |
884 | 0 | WLog_ERR(TAG, |
885 | 0 | "%s - " |
886 | 0 | "rdp_server_accept_mcs_erect_domain_request() fail", |
887 | 0 | rdp_get_state_string(rdp)); |
888 | 0 | } |
889 | 0 | else |
890 | 0 | ret = STATE_RUN_SUCCESS; |
891 | |
|
892 | 0 | break; |
893 | | |
894 | 0 | case CONNECTION_STATE_MCS_ATTACH_USER: |
895 | 0 | if (!rdp_server_accept_mcs_attach_user_request(rdp, s)) |
896 | 0 | { |
897 | 0 | WLog_ERR(TAG, |
898 | 0 | "%s - " |
899 | 0 | "rdp_server_accept_mcs_attach_user_request() fail", |
900 | 0 | rdp_get_state_string(rdp)); |
901 | 0 | } |
902 | 0 | else |
903 | 0 | ret = STATE_RUN_SUCCESS; |
904 | |
|
905 | 0 | break; |
906 | | |
907 | 0 | case CONNECTION_STATE_MCS_CHANNEL_JOIN_REQUEST: |
908 | 0 | if (!rdp_server_accept_mcs_channel_join_request(rdp, s)) |
909 | 0 | { |
910 | 0 | WLog_ERR(TAG, |
911 | 0 | "%s - " |
912 | 0 | "rdp_server_accept_mcs_channel_join_request() fail", |
913 | 0 | rdp_get_state_string(rdp)); |
914 | 0 | } |
915 | 0 | else |
916 | 0 | ret = STATE_RUN_SUCCESS; |
917 | 0 | break; |
918 | | |
919 | 0 | case CONNECTION_STATE_RDP_SECURITY_COMMENCEMENT: |
920 | 0 | ret = STATE_RUN_SUCCESS; |
921 | |
|
922 | 0 | if (!rdp_server_establish_keys(rdp, s)) |
923 | 0 | { |
924 | 0 | WLog_ERR(TAG, |
925 | 0 | "%s - " |
926 | 0 | "rdp_server_establish_keys() fail", |
927 | 0 | rdp_get_state_string(rdp)); |
928 | 0 | ret = STATE_RUN_FAILED; |
929 | 0 | } |
930 | |
|
931 | 0 | if (state_run_success(ret)) |
932 | 0 | { |
933 | 0 | if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_SECURE_SETTINGS_EXCHANGE)) |
934 | 0 | ret = STATE_RUN_FAILED; |
935 | 0 | else if (Stream_GetRemainingLength(s) > 0) |
936 | 0 | ret = STATE_RUN_CONTINUE; /* Rerun function */ |
937 | 0 | } |
938 | 0 | break; |
939 | | |
940 | 0 | case CONNECTION_STATE_SECURE_SETTINGS_EXCHANGE: |
941 | 0 | if (rdp_recv_client_info(rdp, s)) |
942 | 0 | { |
943 | 0 | if (rdp_server_transition_to_state( |
944 | 0 | rdp, CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_REQUEST)) |
945 | 0 | ret = STATE_RUN_CONTINUE; |
946 | 0 | } |
947 | 0 | break; |
948 | | |
949 | 0 | case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_REQUEST: |
950 | 0 | case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_RESPONSE: |
951 | 0 | ret = peer_recv_handle_auto_detect(client, s); |
952 | 0 | break; |
953 | | |
954 | 0 | case CONNECTION_STATE_LICENSING: |
955 | 0 | ret = peer_recv_handle_licensing(client, s); |
956 | 0 | if (ret == STATE_RUN_CONTINUE) |
957 | 0 | { |
958 | 0 | if (!rdp_server_transition_to_state( |
959 | 0 | rdp, CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_REQUEST)) |
960 | 0 | ret = STATE_RUN_FAILED; |
961 | 0 | } |
962 | 0 | break; |
963 | | |
964 | 0 | case CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_REQUEST: |
965 | 0 | if (settings->SupportMultitransport && |
966 | 0 | ((settings->MultitransportFlags & INITIATE_REQUEST_PROTOCOL_UDPFECR) != 0)) |
967 | 0 | { |
968 | | /* only UDP reliable for now, nobody does lossy UDP (MS-RDPUDP only) these days */ |
969 | 0 | ret = multitransport_server_request(rdp->multitransport, |
970 | 0 | INITIATE_REQUEST_PROTOCOL_UDPFECR); |
971 | 0 | switch (ret) |
972 | 0 | { |
973 | 0 | case STATE_RUN_SUCCESS: |
974 | 0 | if (!rdp_server_transition_to_state( |
975 | 0 | rdp, CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_RESPONSE)) |
976 | 0 | ret = STATE_RUN_FAILED; |
977 | 0 | break; |
978 | 0 | case STATE_RUN_CONTINUE: |
979 | | /* mismatch on the supported kind of UDP transports */ |
980 | 0 | if (!rdp_server_transition_to_state( |
981 | 0 | rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE)) |
982 | 0 | ret = STATE_RUN_FAILED; |
983 | 0 | break; |
984 | 0 | default: |
985 | 0 | break; |
986 | 0 | } |
987 | 0 | } |
988 | 0 | else |
989 | 0 | { |
990 | 0 | if (rdp_server_transition_to_state( |
991 | 0 | rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE)) |
992 | 0 | ret = STATE_RUN_CONTINUE; /* Rerun, initialize next state */ |
993 | 0 | } |
994 | 0 | break; |
995 | 0 | case CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_RESPONSE: |
996 | 0 | ret = peer_recv_pdu(client, s); |
997 | 0 | break; |
998 | | |
999 | 0 | case CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE: |
1000 | 0 | ret = rdp_peer_handle_state_demand_active(client); |
1001 | 0 | break; |
1002 | | |
1003 | 0 | case CONNECTION_STATE_CAPABILITIES_EXCHANGE_MONITOR_LAYOUT: |
1004 | 0 | if (freerdp_settings_get_bool(settings, FreeRDP_SupportMonitorLayoutPdu)) |
1005 | 0 | { |
1006 | 0 | MONITOR_DEF* monitors = NULL; |
1007 | |
|
1008 | 0 | if (client->AdjustMonitorsLayout) |
1009 | 0 | { |
1010 | 0 | if (!client->AdjustMonitorsLayout(client)) |
1011 | 0 | return STATE_RUN_FAILED; |
1012 | 0 | } |
1013 | | |
1014 | | /* client supports the monitorLayout PDU, let's send him the monitors if any */ |
1015 | 0 | ret = STATE_RUN_SUCCESS; |
1016 | 0 | if (freerdp_settings_get_uint32(settings, FreeRDP_MonitorCount) == 0) |
1017 | 0 | { |
1018 | 0 | const UINT32 w = freerdp_settings_get_uint32(settings, FreeRDP_DesktopWidth); |
1019 | 0 | const UINT32 h = freerdp_settings_get_uint32(settings, FreeRDP_DesktopHeight); |
1020 | 0 | const rdpMonitor primary = { .x = 0, |
1021 | 0 | .y = 0, |
1022 | 0 | .width = WINPR_ASSERTING_INT_CAST(int32_t, w), |
1023 | 0 | .height = WINPR_ASSERTING_INT_CAST(int32_t, h), |
1024 | 0 | .is_primary = TRUE, |
1025 | 0 | .orig_screen = 0, |
1026 | 0 | .attributes = { .physicalWidth = w, |
1027 | 0 | .physicalHeight = h, |
1028 | 0 | .orientation = |
1029 | 0 | ORIENTATION_LANDSCAPE, |
1030 | 0 | .desktopScaleFactor = 100, |
1031 | 0 | .deviceScaleFactor = 100 } }; |
1032 | 0 | if (!freerdp_settings_set_pointer_array(settings, FreeRDP_MonitorDefArray, 0, |
1033 | 0 | &primary)) |
1034 | 0 | ret = STATE_RUN_FAILED; |
1035 | 0 | else if (!freerdp_settings_set_uint32(settings, FreeRDP_MonitorCount, 1)) |
1036 | 0 | ret = STATE_RUN_FAILED; |
1037 | 0 | } |
1038 | 0 | if (state_run_failed(ret)) |
1039 | 0 | { |
1040 | 0 | } |
1041 | 0 | else if (!display_convert_rdp_monitor_to_monitor_def( |
1042 | 0 | settings->MonitorCount, settings->MonitorDefArray, &monitors)) |
1043 | 0 | { |
1044 | 0 | ret = STATE_RUN_FAILED; |
1045 | 0 | } |
1046 | 0 | else if (!freerdp_display_send_monitor_layout(rdp->context, settings->MonitorCount, |
1047 | 0 | monitors)) |
1048 | 0 | { |
1049 | 0 | ret = STATE_RUN_FAILED; |
1050 | 0 | } |
1051 | 0 | else |
1052 | 0 | ret = STATE_RUN_SUCCESS; |
1053 | 0 | free(monitors); |
1054 | |
|
1055 | 0 | const size_t len = Stream_GetRemainingLength(s); |
1056 | 0 | if (!state_run_failed(ret) && (len > 0)) |
1057 | 0 | ret = STATE_RUN_CONTINUE; |
1058 | 0 | } |
1059 | 0 | else |
1060 | 0 | { |
1061 | 0 | const size_t len = Stream_GetRemainingLength(s); |
1062 | 0 | if (len > 0) |
1063 | 0 | ret = STATE_RUN_CONTINUE; |
1064 | 0 | else |
1065 | 0 | ret = STATE_RUN_SUCCESS; |
1066 | 0 | } |
1067 | 0 | if (state_run_success(ret)) |
1068 | 0 | { |
1069 | 0 | if (!rdp_server_transition_to_state( |
1070 | 0 | rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE_CONFIRM_ACTIVE)) |
1071 | 0 | ret = STATE_RUN_FAILED; |
1072 | 0 | } |
1073 | 0 | break; |
1074 | | |
1075 | 0 | case CONNECTION_STATE_CAPABILITIES_EXCHANGE_CONFIRM_ACTIVE: |
1076 | | /** |
1077 | | * During reactivation sequence the client might sent some input or channel data |
1078 | | * before receiving the Deactivate All PDU. We need to process them as usual. |
1079 | | */ |
1080 | 0 | ret = peer_recv_pdu(client, s); |
1081 | 0 | break; |
1082 | | |
1083 | 0 | case CONNECTION_STATE_FINALIZATION_SYNC: |
1084 | 0 | ret = peer_recv_pdu(client, s); |
1085 | 0 | if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_SYNCHRONIZE_PDU)) |
1086 | 0 | { |
1087 | 0 | if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_FINALIZATION_COOPERATE)) |
1088 | 0 | ret = STATE_RUN_FAILED; |
1089 | 0 | } |
1090 | 0 | else |
1091 | 0 | ret = peer_unexpected_client_message(rdp, FINALIZE_CS_SYNCHRONIZE_PDU); |
1092 | 0 | break; |
1093 | 0 | case CONNECTION_STATE_FINALIZATION_COOPERATE: |
1094 | 0 | ret = peer_recv_pdu(client, s); |
1095 | 0 | if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_CONTROL_COOPERATE_PDU)) |
1096 | 0 | { |
1097 | 0 | if (!rdp_server_transition_to_state(rdp, |
1098 | 0 | CONNECTION_STATE_FINALIZATION_REQUEST_CONTROL)) |
1099 | 0 | ret = STATE_RUN_FAILED; |
1100 | 0 | } |
1101 | 0 | else |
1102 | 0 | ret = peer_unexpected_client_message(rdp, FINALIZE_CS_CONTROL_COOPERATE_PDU); |
1103 | 0 | break; |
1104 | 0 | case CONNECTION_STATE_FINALIZATION_REQUEST_CONTROL: |
1105 | 0 | ret = peer_recv_pdu(client, s); |
1106 | 0 | if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_CONTROL_REQUEST_PDU)) |
1107 | 0 | { |
1108 | 0 | if (!rdp_send_server_control_granted_pdu(rdp)) |
1109 | 0 | ret = STATE_RUN_FAILED; |
1110 | 0 | else if (!rdp_server_transition_to_state( |
1111 | 0 | rdp, CONNECTION_STATE_FINALIZATION_PERSISTENT_KEY_LIST)) |
1112 | 0 | ret = STATE_RUN_FAILED; |
1113 | 0 | } |
1114 | 0 | else |
1115 | 0 | ret = peer_unexpected_client_message(rdp, FINALIZE_CS_CONTROL_REQUEST_PDU); |
1116 | 0 | break; |
1117 | 0 | case CONNECTION_STATE_FINALIZATION_PERSISTENT_KEY_LIST: |
1118 | 0 | if (freerdp_settings_get_bool(settings, FreeRDP_BitmapCachePersistEnabled) && |
1119 | 0 | !rdp_finalize_is_flag_set(rdp, FINALIZE_DEACTIVATE_REACTIVATE)) |
1120 | 0 | { |
1121 | 0 | ret = peer_recv_pdu(client, s); |
1122 | |
|
1123 | 0 | if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_PERSISTENT_KEY_LIST_PDU)) |
1124 | 0 | { |
1125 | 0 | if (!rdp_server_transition_to_state(rdp, |
1126 | 0 | CONNECTION_STATE_FINALIZATION_FONT_LIST)) |
1127 | 0 | ret = STATE_RUN_FAILED; |
1128 | 0 | } |
1129 | 0 | else |
1130 | 0 | ret = peer_unexpected_client_message(rdp, |
1131 | 0 | CONNECTION_STATE_FINALIZATION_FONT_LIST); |
1132 | 0 | } |
1133 | 0 | else |
1134 | 0 | { |
1135 | 0 | if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_FINALIZATION_FONT_LIST)) |
1136 | 0 | ret = STATE_RUN_FAILED; |
1137 | 0 | else |
1138 | 0 | ret = STATE_RUN_CONTINUE; |
1139 | 0 | } |
1140 | 0 | break; |
1141 | 0 | case CONNECTION_STATE_FINALIZATION_FONT_LIST: |
1142 | 0 | ret = peer_recv_pdu(client, s); |
1143 | 0 | if (state_run_success(ret)) |
1144 | 0 | { |
1145 | 0 | if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_FONT_LIST_PDU)) |
1146 | 0 | { |
1147 | 0 | if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_ACTIVE)) |
1148 | 0 | ret = STATE_RUN_FAILED; |
1149 | 0 | else |
1150 | 0 | { |
1151 | 0 | update_reset_state(rdp->update); |
1152 | 0 | ret = STATE_RUN_CONTINUE; |
1153 | 0 | } |
1154 | 0 | } |
1155 | 0 | else |
1156 | 0 | ret = peer_unexpected_client_message(rdp, FINALIZE_CS_FONT_LIST_PDU); |
1157 | 0 | } |
1158 | 0 | break; |
1159 | | |
1160 | 0 | case CONNECTION_STATE_ACTIVE: |
1161 | 0 | ret = rdp_peer_handle_state_active(client); |
1162 | 0 | if (ret >= STATE_RUN_ACTIVE) |
1163 | 0 | ret = peer_recv_pdu(client, s); |
1164 | 0 | break; |
1165 | | |
1166 | | /* States that must not happen in server state machine */ |
1167 | 0 | case CONNECTION_STATE_FINALIZATION_CLIENT_SYNC: |
1168 | 0 | case CONNECTION_STATE_FINALIZATION_CLIENT_COOPERATE: |
1169 | 0 | case CONNECTION_STATE_FINALIZATION_CLIENT_GRANTED_CONTROL: |
1170 | 0 | case CONNECTION_STATE_FINALIZATION_CLIENT_FONT_MAP: |
1171 | 0 | default: |
1172 | 0 | WLog_ERR(TAG, "%s state %" PRId32, rdp_get_state_string(rdp), |
1173 | 0 | WINPR_CXX_COMPAT_CAST(int32_t, rdp_get_state(rdp))); |
1174 | 0 | break; |
1175 | 0 | } |
1176 | | |
1177 | 0 | return ret; |
1178 | 0 | } |
1179 | | |
1180 | | static state_run_t peer_recv_callback(rdpTransport* transport, wStream* s, void* extra) |
1181 | 0 | { |
1182 | 0 | char buffer[64] = WINPR_C_ARRAY_INIT; |
1183 | 0 | state_run_t rc = STATE_RUN_FAILED; |
1184 | 0 | const size_t start = Stream_GetPosition(s); |
1185 | 0 | const rdpContext* context = transport_get_context(transport); |
1186 | 0 | DWORD level = WLOG_TRACE; |
1187 | 0 | static wLog* log = NULL; |
1188 | 0 | if (!log) |
1189 | 0 | log = WLog_Get(TAG); |
1190 | |
|
1191 | 0 | WINPR_ASSERT(context); |
1192 | 0 | do |
1193 | 0 | { |
1194 | 0 | const rdpRdp* rdp = context->rdp; |
1195 | 0 | const char* old = rdp_get_state_string(rdp); |
1196 | |
|
1197 | 0 | if (rc == STATE_RUN_TRY_AGAIN) |
1198 | 0 | Stream_SetPosition(s, start); |
1199 | 0 | rc = peer_recv_callback_internal(transport, s, extra); |
1200 | |
|
1201 | 0 | const size_t len = Stream_GetRemainingLength(s); |
1202 | 0 | if ((len > 0) && !state_run_continue(rc)) |
1203 | 0 | level = WLOG_WARN; |
1204 | 0 | WLog_Print(log, level, |
1205 | 0 | "(server)[%s -> %s] current return %s [%" PRIuz " bytes not processed]", old, |
1206 | 0 | rdp_get_state_string(rdp), state_run_result_string(rc, buffer, sizeof(buffer)), |
1207 | 0 | len); |
1208 | 0 | } while (state_run_continue(rc)); |
1209 | |
|
1210 | 0 | return rc; |
1211 | 0 | } |
1212 | | |
1213 | | static BOOL freerdp_peer_close(freerdp_peer* client) |
1214 | 0 | { |
1215 | 0 | UINT32 SelectedProtocol = 0; |
1216 | 0 | rdpContext* context = NULL; |
1217 | |
|
1218 | 0 | WINPR_ASSERT(client); |
1219 | |
|
1220 | 0 | context = client->context; |
1221 | 0 | WINPR_ASSERT(context); |
1222 | 0 | WINPR_ASSERT(context->settings); |
1223 | 0 | WINPR_ASSERT(context->rdp); |
1224 | | |
1225 | | /** if negotiation has failed, we're not MCS connected. So don't |
1226 | | * send anything else, or some mstsc will consider that as an error |
1227 | | */ |
1228 | 0 | SelectedProtocol = nego_get_selected_protocol(context->rdp->nego); |
1229 | |
|
1230 | 0 | if (SelectedProtocol & PROTOCOL_FAILED_NEGO) |
1231 | 0 | return TRUE; |
1232 | | |
1233 | | /** |
1234 | | * [MS-RDPBCGR] 1.3.1.4.2 User-Initiated Disconnection Sequence on Server |
1235 | | * The server first sends the client a Deactivate All PDU followed by an |
1236 | | * optional MCS Disconnect Provider Ultimatum PDU. |
1237 | | */ |
1238 | 0 | if (!rdp_send_deactivate_all(context->rdp)) |
1239 | 0 | return FALSE; |
1240 | | |
1241 | 0 | if (freerdp_settings_get_bool(context->settings, FreeRDP_SupportErrorInfoPdu)) |
1242 | 0 | { |
1243 | 0 | if (!rdp_send_error_info(context->rdp)) |
1244 | 0 | return FALSE; |
1245 | 0 | } |
1246 | | |
1247 | 0 | return mcs_send_disconnect_provider_ultimatum(context->rdp->mcs, |
1248 | 0 | Disconnect_Ultimatum_provider_initiated); |
1249 | 0 | } |
1250 | | |
1251 | | static void freerdp_peer_disconnect(freerdp_peer* client) |
1252 | 0 | { |
1253 | 0 | rdpTransport* transport = NULL; |
1254 | 0 | WINPR_ASSERT(client); |
1255 | |
|
1256 | 0 | transport = freerdp_get_transport(client->context); |
1257 | 0 | transport_disconnect(transport); |
1258 | 0 | } |
1259 | | |
1260 | | static BOOL freerdp_peer_send_channel_data(freerdp_peer* client, UINT16 channelId, const BYTE* data, |
1261 | | size_t size) |
1262 | 0 | { |
1263 | 0 | WINPR_ASSERT(client); |
1264 | 0 | WINPR_ASSERT(client->context); |
1265 | 0 | WINPR_ASSERT(client->context->rdp); |
1266 | 0 | return rdp_send_channel_data(client->context->rdp, channelId, data, size); |
1267 | 0 | } |
1268 | | |
1269 | | static BOOL freerdp_peer_send_server_redirection_pdu(freerdp_peer* peer, |
1270 | | const rdpRedirection* redirection) |
1271 | 0 | { |
1272 | 0 | BOOL rc = FALSE; |
1273 | 0 | WINPR_ASSERT(peer); |
1274 | 0 | WINPR_ASSERT(peer->context); |
1275 | |
|
1276 | 0 | UINT16 sec_flags = 0; |
1277 | 0 | wStream* s = rdp_send_stream_pdu_init(peer->context->rdp, &sec_flags); |
1278 | 0 | if (!s) |
1279 | 0 | return FALSE; |
1280 | 0 | if (!rdp_write_enhanced_security_redirection_packet(s, redirection)) |
1281 | 0 | goto fail; |
1282 | 0 | if (!rdp_send_pdu(peer->context->rdp, s, PDU_TYPE_SERVER_REDIRECTION, 0, sec_flags)) |
1283 | 0 | goto fail; |
1284 | 0 | rc = rdp_reset_runtime_settings(peer->context->rdp); |
1285 | 0 | fail: |
1286 | 0 | Stream_Release(s); |
1287 | 0 | return rc; |
1288 | 0 | } |
1289 | | |
1290 | | static BOOL freerdp_peer_send_channel_packet(freerdp_peer* client, UINT16 channelId, |
1291 | | size_t totalSize, UINT32 flags, const BYTE* data, |
1292 | | size_t chunkSize) |
1293 | 0 | { |
1294 | 0 | WINPR_ASSERT(client); |
1295 | 0 | WINPR_ASSERT(client->context); |
1296 | 0 | WINPR_ASSERT(client->context->rdp); |
1297 | 0 | return rdp_channel_send_packet(client->context->rdp, channelId, totalSize, flags, data, |
1298 | 0 | chunkSize); |
1299 | 0 | } |
1300 | | |
1301 | | static BOOL freerdp_peer_is_write_blocked(freerdp_peer* peer) |
1302 | 0 | { |
1303 | 0 | rdpTransport* transport = NULL; |
1304 | 0 | WINPR_ASSERT(peer); |
1305 | 0 | WINPR_ASSERT(peer->context); |
1306 | 0 | WINPR_ASSERT(peer->context->rdp); |
1307 | 0 | WINPR_ASSERT(peer->context->rdp->transport); |
1308 | 0 | transport = peer->context->rdp->transport; |
1309 | 0 | return transport_is_write_blocked(transport); |
1310 | 0 | } |
1311 | | |
1312 | | static int freerdp_peer_drain_output_buffer(freerdp_peer* peer) |
1313 | 0 | { |
1314 | 0 | rdpTransport* transport = NULL; |
1315 | 0 | WINPR_ASSERT(peer); |
1316 | 0 | WINPR_ASSERT(peer->context); |
1317 | 0 | WINPR_ASSERT(peer->context->rdp); |
1318 | 0 | WINPR_ASSERT(peer->context->rdp->transport); |
1319 | 0 | transport = peer->context->rdp->transport; |
1320 | 0 | return transport_drain_output_buffer(transport); |
1321 | 0 | } |
1322 | | |
1323 | | static BOOL freerdp_peer_has_more_to_read(freerdp_peer* peer) |
1324 | 0 | { |
1325 | 0 | WINPR_ASSERT(peer); |
1326 | 0 | WINPR_ASSERT(peer->context); |
1327 | 0 | WINPR_ASSERT(peer->context->rdp); |
1328 | 0 | return transport_have_more_bytes_to_read(peer->context->rdp->transport); |
1329 | 0 | } |
1330 | | |
1331 | | static LicenseCallbackResult freerdp_peer_nolicense(freerdp_peer* peer, |
1332 | | WINPR_ATTR_UNUSED wStream* s) |
1333 | 0 | { |
1334 | 0 | rdpRdp* rdp = NULL; |
1335 | |
|
1336 | 0 | WINPR_ASSERT(peer); |
1337 | 0 | WINPR_ASSERT(peer->context); |
1338 | |
|
1339 | 0 | rdp = peer->context->rdp; |
1340 | |
|
1341 | 0 | if (!license_send_valid_client_error_packet(rdp)) |
1342 | 0 | { |
1343 | 0 | WLog_ERR(TAG, "freerdp_peer_nolicense: license_send_valid_client_error_packet() failed"); |
1344 | 0 | return LICENSE_CB_ABORT; |
1345 | 0 | } |
1346 | | |
1347 | 0 | return LICENSE_CB_COMPLETED; |
1348 | 0 | } |
1349 | | |
1350 | | BOOL freerdp_peer_context_new(freerdp_peer* client) |
1351 | 6.40k | { |
1352 | 6.40k | return freerdp_peer_context_new_ex(client, NULL); |
1353 | 6.40k | } |
1354 | | |
1355 | | void freerdp_peer_context_free(freerdp_peer* client) |
1356 | 6.40k | { |
1357 | 6.40k | if (!client) |
1358 | 0 | return; |
1359 | | |
1360 | 6.40k | IFCALL(client->ContextFree, client, client->context); |
1361 | | |
1362 | 6.40k | if (client->context) |
1363 | 6.40k | { |
1364 | 6.40k | rdpContext* ctx = client->context; |
1365 | | |
1366 | 6.40k | (void)CloseHandle(ctx->channelErrorEvent); |
1367 | 6.40k | ctx->channelErrorEvent = NULL; |
1368 | 6.40k | free(ctx->errorDescription); |
1369 | 6.40k | ctx->errorDescription = NULL; |
1370 | 6.40k | rdp_free(ctx->rdp); |
1371 | 6.40k | ctx->rdp = NULL; |
1372 | 6.40k | metrics_free(ctx->metrics); |
1373 | 6.40k | ctx->metrics = NULL; |
1374 | 6.40k | stream_dump_free(ctx->dump); |
1375 | 6.40k | ctx->dump = NULL; |
1376 | 6.40k | free(ctx); |
1377 | 6.40k | } |
1378 | 6.40k | client->context = NULL; |
1379 | 6.40k | } |
1380 | | |
1381 | | static const char* os_major_type_to_string(UINT16 osMajorType) |
1382 | 0 | { |
1383 | 0 | switch (osMajorType) |
1384 | 0 | { |
1385 | 0 | case OSMAJORTYPE_UNSPECIFIED: |
1386 | 0 | return "Unspecified platform"; |
1387 | 0 | case OSMAJORTYPE_WINDOWS: |
1388 | 0 | return "Windows platform"; |
1389 | 0 | case OSMAJORTYPE_OS2: |
1390 | 0 | return "OS/2 platform"; |
1391 | 0 | case OSMAJORTYPE_MACINTOSH: |
1392 | 0 | return "Macintosh platform"; |
1393 | 0 | case OSMAJORTYPE_UNIX: |
1394 | 0 | return "UNIX platform"; |
1395 | 0 | case OSMAJORTYPE_IOS: |
1396 | 0 | return "iOS platform"; |
1397 | 0 | case OSMAJORTYPE_OSX: |
1398 | 0 | return "OS X platform"; |
1399 | 0 | case OSMAJORTYPE_ANDROID: |
1400 | 0 | return "Android platform"; |
1401 | 0 | case OSMAJORTYPE_CHROME_OS: |
1402 | 0 | return "Chrome OS platform"; |
1403 | 0 | default: |
1404 | 0 | break; |
1405 | 0 | } |
1406 | | |
1407 | 0 | return "Unknown platform"; |
1408 | 0 | } |
1409 | | |
1410 | | const char* freerdp_peer_os_major_type_string(freerdp_peer* client) |
1411 | 0 | { |
1412 | 0 | WINPR_ASSERT(client); |
1413 | |
|
1414 | 0 | rdpContext* context = client->context; |
1415 | 0 | WINPR_ASSERT(context); |
1416 | 0 | WINPR_ASSERT(context->settings); |
1417 | |
|
1418 | 0 | const UINT32 osMajorType = freerdp_settings_get_uint32(context->settings, FreeRDP_OsMajorType); |
1419 | 0 | WINPR_ASSERT(osMajorType <= UINT16_MAX); |
1420 | 0 | return os_major_type_to_string((UINT16)osMajorType); |
1421 | 0 | } |
1422 | | |
1423 | | static const char* os_minor_type_to_string(UINT16 osMinorType) |
1424 | 0 | { |
1425 | 0 | switch (osMinorType) |
1426 | 0 | { |
1427 | 0 | case OSMINORTYPE_UNSPECIFIED: |
1428 | 0 | return "Unspecified version"; |
1429 | 0 | case OSMINORTYPE_WINDOWS_31X: |
1430 | 0 | return "Windows 3.1x"; |
1431 | 0 | case OSMINORTYPE_WINDOWS_95: |
1432 | 0 | return "Windows 95"; |
1433 | 0 | case OSMINORTYPE_WINDOWS_NT: |
1434 | 0 | return "Windows NT"; |
1435 | 0 | case OSMINORTYPE_OS2_V21: |
1436 | 0 | return "OS/2 2.1"; |
1437 | 0 | case OSMINORTYPE_POWER_PC: |
1438 | 0 | return "PowerPC"; |
1439 | 0 | case OSMINORTYPE_MACINTOSH: |
1440 | 0 | return "Macintosh"; |
1441 | 0 | case OSMINORTYPE_NATIVE_XSERVER: |
1442 | 0 | return "Native X Server"; |
1443 | 0 | case OSMINORTYPE_PSEUDO_XSERVER: |
1444 | 0 | return "Pseudo X Server"; |
1445 | 0 | case OSMINORTYPE_WINDOWS_RT: |
1446 | 0 | return "Windows RT"; |
1447 | 0 | default: |
1448 | 0 | break; |
1449 | 0 | } |
1450 | | |
1451 | 0 | return "Unknown version"; |
1452 | 0 | } |
1453 | | |
1454 | | const char* freerdp_peer_os_minor_type_string(freerdp_peer* client) |
1455 | 0 | { |
1456 | 0 | WINPR_ASSERT(client); |
1457 | |
|
1458 | 0 | rdpContext* context = client->context; |
1459 | 0 | WINPR_ASSERT(context); |
1460 | 0 | WINPR_ASSERT(context->settings); |
1461 | |
|
1462 | 0 | const UINT32 osMinorType = freerdp_settings_get_uint32(context->settings, FreeRDP_OsMinorType); |
1463 | 0 | WINPR_ASSERT(osMinorType <= UINT16_MAX); |
1464 | 0 | return os_minor_type_to_string((UINT16)osMinorType); |
1465 | 0 | } |
1466 | | |
1467 | | freerdp_peer* freerdp_peer_new(int sockfd) |
1468 | 0 | { |
1469 | 0 | freerdp_peer* client = (freerdp_peer*)calloc(1, sizeof(freerdp_peer)); |
1470 | |
|
1471 | 0 | if (!client) |
1472 | 0 | return NULL; |
1473 | | |
1474 | 0 | if (sockfd >= 0) |
1475 | 0 | { |
1476 | 0 | (void)freerdp_tcp_set_nodelay(WLog_Get(TAG), WLOG_DEBUG, sockfd); |
1477 | 0 | } |
1478 | |
|
1479 | 0 | if (client) |
1480 | 0 | { |
1481 | 0 | client->sockfd = sockfd; |
1482 | 0 | client->ContextSize = sizeof(rdpContext); |
1483 | 0 | client->Initialize = freerdp_peer_initialize; |
1484 | | #if defined(WITH_FREERDP_DEPRECATED) |
1485 | | client->GetFileDescriptor = freerdp_peer_get_fds; |
1486 | | #endif |
1487 | 0 | client->GetEventHandle = freerdp_peer_get_event_handle; |
1488 | 0 | client->GetEventHandles = freerdp_peer_get_event_handles; |
1489 | 0 | client->CheckFileDescriptor = freerdp_peer_check_fds; |
1490 | 0 | client->Close = freerdp_peer_close; |
1491 | 0 | client->Disconnect = freerdp_peer_disconnect; |
1492 | 0 | client->SendChannelData = freerdp_peer_send_channel_data; |
1493 | 0 | client->SendChannelPacket = freerdp_peer_send_channel_packet; |
1494 | 0 | client->SendServerRedirection = freerdp_peer_send_server_redirection_pdu; |
1495 | 0 | client->IsWriteBlocked = freerdp_peer_is_write_blocked; |
1496 | 0 | client->DrainOutputBuffer = freerdp_peer_drain_output_buffer; |
1497 | 0 | client->HasMoreToRead = freerdp_peer_has_more_to_read; |
1498 | 0 | client->VirtualChannelOpen = freerdp_peer_virtual_channel_open; |
1499 | 0 | client->VirtualChannelClose = freerdp_peer_virtual_channel_close; |
1500 | 0 | client->VirtualChannelWrite = freerdp_peer_virtual_channel_write; |
1501 | 0 | client->VirtualChannelRead = NULL; /* must be defined by server application */ |
1502 | 0 | client->VirtualChannelGetData = freerdp_peer_virtual_channel_get_data; |
1503 | 0 | client->VirtualChannelSetData = freerdp_peer_virtual_channel_set_data; |
1504 | 0 | client->SetState = freerdp_peer_set_state; |
1505 | 0 | } |
1506 | |
|
1507 | 0 | return client; |
1508 | 0 | } |
1509 | | |
1510 | | void freerdp_peer_free(freerdp_peer* client) |
1511 | 0 | { |
1512 | 0 | if (!client) |
1513 | 0 | return; |
1514 | | |
1515 | 0 | sspi_FreeAuthIdentity(&client->identity); |
1516 | 0 | if (client->sockfd >= 0) |
1517 | 0 | closesocket((SOCKET)client->sockfd); |
1518 | 0 | free(client); |
1519 | 0 | } |
1520 | | |
1521 | | static BOOL freerdp_peer_transport_setup(freerdp_peer* client) |
1522 | 6.40k | { |
1523 | 6.40k | rdpRdp* rdp = NULL; |
1524 | | |
1525 | 6.40k | WINPR_ASSERT(client); |
1526 | 6.40k | WINPR_ASSERT(client->context); |
1527 | | |
1528 | 6.40k | rdp = client->context->rdp; |
1529 | 6.40k | WINPR_ASSERT(rdp); |
1530 | | |
1531 | 6.40k | if (!transport_attach(rdp->transport, client->sockfd)) |
1532 | 0 | return FALSE; |
1533 | 6.40k | client->sockfd = -1; |
1534 | | |
1535 | 6.40k | if (!transport_set_recv_callbacks(rdp->transport, peer_recv_callback, client)) |
1536 | 0 | return FALSE; |
1537 | | |
1538 | 6.40k | if (!transport_set_blocking_mode(rdp->transport, FALSE)) |
1539 | 0 | return FALSE; |
1540 | | |
1541 | 6.40k | return TRUE; |
1542 | 6.40k | } |
1543 | | |
1544 | | BOOL freerdp_peer_context_new_ex(freerdp_peer* client, const rdpSettings* settings) |
1545 | 6.40k | { |
1546 | 6.40k | rdpRdp* rdp = NULL; |
1547 | 6.40k | rdpContext* context = NULL; |
1548 | 6.40k | BOOL ret = TRUE; |
1549 | | |
1550 | 6.40k | if (!client) |
1551 | 0 | return FALSE; |
1552 | | |
1553 | 6.40k | WINPR_ASSERT(client->ContextSize >= sizeof(rdpContext)); |
1554 | 6.40k | if (!(context = (rdpContext*)calloc(1, client->ContextSize))) |
1555 | 0 | goto fail; |
1556 | | |
1557 | 6.40k | client->context = context; |
1558 | 6.40k | context->peer = client; |
1559 | 6.40k | context->ServerMode = TRUE; |
1560 | 6.40k | context->log = WLog_Get(TAG); |
1561 | 6.40k | if (!context->log) |
1562 | 0 | goto fail; |
1563 | | |
1564 | 6.40k | if (settings) |
1565 | 0 | { |
1566 | 0 | context->settings = freerdp_settings_clone(settings); |
1567 | 0 | if (!context->settings) |
1568 | 0 | goto fail; |
1569 | 0 | } |
1570 | | |
1571 | 6.40k | context->dump = stream_dump_new(); |
1572 | 6.40k | if (!context->dump) |
1573 | 0 | goto fail; |
1574 | 6.40k | if (!(context->metrics = metrics_new(context))) |
1575 | 0 | goto fail; |
1576 | | |
1577 | 6.40k | if (!(rdp = rdp_new(context))) |
1578 | 0 | goto fail; |
1579 | | |
1580 | 6.40k | rdp_log_build_warnings(rdp); |
1581 | | |
1582 | | #if defined(WITH_FREERDP_DEPRECATED) |
1583 | | client->update = rdp->update; |
1584 | | client->settings = rdp->settings; |
1585 | | client->autodetect = rdp->autodetect; |
1586 | | #endif |
1587 | 6.40k | context->rdp = rdp; |
1588 | 6.40k | context->input = rdp->input; |
1589 | 6.40k | context->update = rdp->update; |
1590 | 6.40k | context->settings = rdp->settings; |
1591 | 6.40k | context->autodetect = rdp->autodetect; |
1592 | 6.40k | update_register_server_callbacks(rdp->update); |
1593 | 6.40k | autodetect_register_server_callbacks(rdp->autodetect); |
1594 | | |
1595 | 6.40k | if (!(context->channelErrorEvent = CreateEvent(NULL, TRUE, FALSE, NULL))) |
1596 | 0 | { |
1597 | 0 | WLog_ERR(TAG, "CreateEvent failed!"); |
1598 | 0 | goto fail; |
1599 | 0 | } |
1600 | | |
1601 | 6.40k | if (!(context->errorDescription = calloc(1, 500))) |
1602 | 0 | { |
1603 | 0 | WLog_ERR(TAG, "calloc failed!"); |
1604 | 0 | goto fail; |
1605 | 0 | } |
1606 | | |
1607 | 6.40k | if (!freerdp_peer_transport_setup(client)) |
1608 | 0 | goto fail; |
1609 | | |
1610 | 6.40k | client->IsWriteBlocked = freerdp_peer_is_write_blocked; |
1611 | 6.40k | client->DrainOutputBuffer = freerdp_peer_drain_output_buffer; |
1612 | 6.40k | client->HasMoreToRead = freerdp_peer_has_more_to_read; |
1613 | 6.40k | client->LicenseCallback = freerdp_peer_nolicense; |
1614 | 6.40k | IFCALLRET(client->ContextNew, ret, client, client->context); |
1615 | | |
1616 | 6.40k | if (!ret) |
1617 | 0 | goto fail; |
1618 | 6.40k | return TRUE; |
1619 | | |
1620 | 0 | fail: |
1621 | 0 | WLog_ERR(TAG, "ContextNew callback failed"); |
1622 | 0 | freerdp_peer_context_free(client); |
1623 | 0 | return FALSE; |
1624 | 6.40k | } |