Coverage Report

Created: 2026-03-04 06:17

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/FreeRDP/libfreerdp/core/peer.c
Line
Count
Source
1
/**
2
 * FreeRDP: A Remote Desktop Protocol Implementation
3
 * RDP Server Peer
4
 *
5
 * Copyright 2011 Vic Lee
6
 * Copyright 2014 DI (FH) Martin Haimberger <martin.haimberger@thincast.com>
7
 * Copyright 2023 Armin Novak <anovak@thincast.com>
8
 * Copyright 2023 Thincast Technologies GmbH
9
 *
10
 * Licensed under the Apache License, Version 2.0 (the "License");
11
 * you may not use this file except in compliance with the License.
12
 * You may obtain a copy of the License at
13
 *
14
 *     http://www.apache.org/licenses/LICENSE-2.0
15
 *
16
 * Unless required by applicable law or agreed to in writing, software
17
 * distributed under the License is distributed on an "AS IS" BASIS,
18
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
19
 * See the License for the specific language governing permissions and
20
 * limitations under the License.
21
 */
22
23
#include <freerdp/config.h>
24
25
#include "settings.h"
26
27
#include <winpr/assert.h>
28
#include <winpr/cast.h>
29
#include <winpr/crt.h>
30
#include <winpr/winsock.h>
31
32
#include "info.h"
33
#include "display.h"
34
35
#include <freerdp/log.h>
36
#include <freerdp/streamdump.h>
37
#include <freerdp/redirection.h>
38
#include <freerdp/crypto/certificate.h>
39
40
#include "rdp.h"
41
#include "peer.h"
42
#include "multitransport.h"
43
44
7.31k
#define TAG FREERDP_TAG("core.peer")
45
46
static state_run_t peer_recv_pdu(freerdp_peer* client, wStream* s);
47
48
static HANDLE freerdp_peer_virtual_channel_open(freerdp_peer* client, const char* name,
49
                                                UINT32 flags)
50
0
{
51
0
  UINT32 index = 0;
52
0
  BOOL joined = FALSE;
53
0
  rdpMcsChannel* mcsChannel = nullptr;
54
0
  rdpPeerChannel* peerChannel = nullptr;
55
0
  rdpMcs* mcs = nullptr;
56
57
0
  WINPR_ASSERT(client);
58
0
  WINPR_ASSERT(client->context);
59
0
  WINPR_ASSERT(client->context->rdp);
60
0
  WINPR_ASSERT(name);
61
0
  mcs = client->context->rdp->mcs;
62
0
  WINPR_ASSERT(mcs);
63
64
0
  if (flags & WTS_CHANNEL_OPTION_DYNAMIC)
65
0
    return nullptr; /* not yet supported */
66
67
0
  const size_t length = strnlen(name, 9);
68
69
0
  if (length > 8)
70
0
    return nullptr; /* SVC maximum name length is 8 */
71
72
0
  for (; index < mcs->channelCount; index++)
73
0
  {
74
0
    mcsChannel = &(mcs->channels[index]);
75
76
0
    if (!mcsChannel->joined)
77
0
      continue;
78
79
0
    if (_strnicmp(name, mcsChannel->Name, length) == 0)
80
0
    {
81
0
      joined = TRUE;
82
0
      break;
83
0
    }
84
0
  }
85
86
0
  if (!joined)
87
0
    return nullptr; /* channel is not joined */
88
89
0
  peerChannel = (rdpPeerChannel*)mcsChannel->handle;
90
91
0
  if (peerChannel)
92
0
  {
93
    /* channel is already open */
94
0
    return (HANDLE)peerChannel;
95
0
  }
96
97
0
  WINPR_ASSERT(index <= UINT16_MAX);
98
0
  peerChannel =
99
0
      server_channel_common_new(client, (UINT16)index, mcsChannel->ChannelId, 128, nullptr, name);
100
101
0
  if (peerChannel)
102
0
  {
103
0
    peerChannel->channelFlags = flags;
104
0
    peerChannel->mcsChannel = mcsChannel;
105
0
    mcsChannel->handle = (void*)peerChannel;
106
0
  }
107
108
0
  return (HANDLE)peerChannel;
109
0
}
110
111
static BOOL freerdp_peer_virtual_channel_close(WINPR_ATTR_UNUSED freerdp_peer* client,
112
                                               HANDLE hChannel)
113
0
{
114
0
  rdpMcsChannel* mcsChannel = nullptr;
115
0
  rdpPeerChannel* peerChannel = nullptr;
116
117
0
  WINPR_ASSERT(client);
118
119
0
  if (!hChannel)
120
0
    return FALSE;
121
122
0
  peerChannel = (rdpPeerChannel*)hChannel;
123
0
  mcsChannel = peerChannel->mcsChannel;
124
0
  WINPR_ASSERT(mcsChannel);
125
0
  mcsChannel->handle = nullptr;
126
0
  server_channel_common_free(peerChannel);
127
0
  return TRUE;
128
0
}
129
130
static int freerdp_peer_virtual_channel_write(freerdp_peer* client, HANDLE hChannel,
131
                                              const BYTE* buffer, UINT32 length)
132
0
{
133
0
  wStream* s = nullptr;
134
0
  UINT32 flags = 0;
135
0
  UINT32 chunkSize = 0;
136
0
  UINT32 maxChunkSize = 0;
137
0
  UINT32 totalLength = 0;
138
0
  rdpPeerChannel* peerChannel = nullptr;
139
0
  rdpMcsChannel* mcsChannel = nullptr;
140
0
  rdpRdp* rdp = nullptr;
141
142
0
  WINPR_ASSERT(client);
143
0
  WINPR_ASSERT(client->context);
144
145
0
  rdp = client->context->rdp;
146
0
  WINPR_ASSERT(rdp);
147
0
  WINPR_ASSERT(rdp->settings);
148
149
0
  if (!hChannel)
150
0
    return -1;
151
152
0
  peerChannel = (rdpPeerChannel*)hChannel;
153
0
  mcsChannel = peerChannel->mcsChannel;
154
0
  WINPR_ASSERT(peerChannel);
155
0
  WINPR_ASSERT(mcsChannel);
156
0
  if (peerChannel->channelFlags & WTS_CHANNEL_OPTION_DYNAMIC)
157
0
    return -1; /* not yet supported */
158
159
0
  maxChunkSize = rdp->settings->VCChunkSize;
160
0
  totalLength = length;
161
0
  flags = CHANNEL_FLAG_FIRST;
162
163
0
  while (length > 0)
164
0
  {
165
0
    UINT16 sec_flags = 0;
166
0
    s = rdp_send_stream_init(rdp, &sec_flags);
167
168
0
    if (!s)
169
0
      return -1;
170
171
0
    if (length > maxChunkSize)
172
0
    {
173
0
      chunkSize = rdp->settings->VCChunkSize;
174
0
    }
175
0
    else
176
0
    {
177
0
      chunkSize = length;
178
0
      flags |= CHANNEL_FLAG_LAST;
179
0
    }
180
181
0
    if (mcsChannel->options & CHANNEL_OPTION_SHOW_PROTOCOL)
182
0
      flags |= CHANNEL_FLAG_SHOW_PROTOCOL;
183
184
0
    Stream_Write_UINT32(s, totalLength);
185
0
    Stream_Write_UINT32(s, flags);
186
187
0
    if (!Stream_EnsureRemainingCapacity(s, chunkSize))
188
0
    {
189
0
      Stream_Release(s);
190
0
      return -1;
191
0
    }
192
193
0
    Stream_Write(s, buffer, chunkSize);
194
195
0
    WINPR_ASSERT(peerChannel->channelId <= UINT16_MAX);
196
0
    if (!rdp_send(rdp, s, (UINT16)peerChannel->channelId, sec_flags))
197
0
      return -1;
198
199
0
    buffer += chunkSize;
200
0
    length -= chunkSize;
201
0
    flags = 0;
202
0
  }
203
204
0
  return 1;
205
0
}
206
207
static void* freerdp_peer_virtual_channel_get_data(WINPR_ATTR_UNUSED freerdp_peer* client,
208
                                                   HANDLE hChannel)
209
0
{
210
0
  rdpPeerChannel* peerChannel = (rdpPeerChannel*)hChannel;
211
212
0
  WINPR_ASSERT(client);
213
0
  if (!hChannel)
214
0
    return nullptr;
215
216
0
  return peerChannel->extra;
217
0
}
218
219
static int freerdp_peer_virtual_channel_set_data(WINPR_ATTR_UNUSED freerdp_peer* client,
220
                                                 HANDLE hChannel, void* data)
221
0
{
222
0
  rdpPeerChannel* peerChannel = (rdpPeerChannel*)hChannel;
223
224
0
  WINPR_ASSERT(client);
225
0
  if (!hChannel)
226
0
    return -1;
227
228
0
  peerChannel->extra = data;
229
0
  return 1;
230
0
}
231
232
static BOOL freerdp_peer_set_state(freerdp_peer* client, CONNECTION_STATE state)
233
0
{
234
0
  WINPR_ASSERT(client);
235
0
  WINPR_ASSERT(client->context);
236
0
  return rdp_server_transition_to_state(client->context->rdp, state);
237
0
}
238
239
static BOOL freerdp_peer_initialize(freerdp_peer* client)
240
0
{
241
0
  rdpRdp* rdp = nullptr;
242
0
  rdpSettings* settings = nullptr;
243
244
0
  WINPR_ASSERT(client);
245
0
  WINPR_ASSERT(client->context);
246
247
0
  rdp = client->context->rdp;
248
0
  WINPR_ASSERT(rdp);
249
250
0
  settings = rdp->settings;
251
0
  WINPR_ASSERT(settings);
252
253
0
  settings->ServerMode = TRUE;
254
0
  settings->FrameAcknowledge = 0;
255
0
  settings->LocalConnection = client->local;
256
257
0
  const rdpCertificate* cert =
258
0
      freerdp_settings_get_pointer(settings, FreeRDP_RdpServerCertificate);
259
0
  if (!cert)
260
0
  {
261
0
    WLog_ERR(TAG, "Missing server certificate, can not continue.");
262
0
    return FALSE;
263
0
  }
264
265
0
  if (freerdp_settings_get_bool(settings, FreeRDP_RdpSecurity))
266
0
  {
267
268
0
    if (!freerdp_certificate_is_rdp_security_compatible(cert))
269
0
    {
270
0
      if (!freerdp_settings_set_bool(settings, FreeRDP_RdpSecurity, FALSE))
271
0
        return FALSE;
272
0
      if (!freerdp_settings_set_bool(settings, FreeRDP_UseRdpSecurityLayer, FALSE))
273
0
        return FALSE;
274
0
    }
275
0
  }
276
277
0
  nego_set_RCG_supported(rdp->nego, settings->RemoteCredentialGuard);
278
0
  nego_set_restricted_admin_mode_supported(rdp->nego, settings->RestrictedAdminModeSupported);
279
280
0
  return (rdp_server_transition_to_state(rdp, CONNECTION_STATE_INITIAL));
281
0
}
282
283
#if defined(WITH_FREERDP_DEPRECATED)
284
static BOOL freerdp_peer_get_fds(freerdp_peer* client, void** rfds, int* rcount)
285
{
286
  rdpTransport* transport = nullptr;
287
  WINPR_ASSERT(client);
288
  WINPR_ASSERT(client->context);
289
  WINPR_ASSERT(client->context->rdp);
290
291
  transport = client->context->rdp->transport;
292
  WINPR_ASSERT(transport);
293
  transport_get_fds(transport, rfds, rcount);
294
  return TRUE;
295
}
296
#endif
297
298
static HANDLE freerdp_peer_get_event_handle(freerdp_peer* client)
299
0
{
300
0
  HANDLE hEvent = nullptr;
301
0
  rdpTransport* transport = nullptr;
302
0
  WINPR_ASSERT(client);
303
0
  WINPR_ASSERT(client->context);
304
0
  WINPR_ASSERT(client->context->rdp);
305
306
0
  transport = client->context->rdp->transport;
307
0
  hEvent = transport_get_front_bio(transport);
308
0
  return hEvent;
309
0
}
310
311
static DWORD freerdp_peer_get_event_handles(freerdp_peer* client, HANDLE* events, DWORD count)
312
0
{
313
0
  WINPR_ASSERT(client);
314
0
  WINPR_ASSERT(client->context);
315
0
  WINPR_ASSERT(client->context->rdp);
316
0
  return transport_get_event_handles(client->context->rdp->transport, events, count);
317
0
}
318
319
static BOOL freerdp_peer_check_fds(freerdp_peer* peer)
320
0
{
321
0
  int status = 0;
322
0
  rdpRdp* rdp = nullptr;
323
324
0
  WINPR_ASSERT(peer);
325
0
  WINPR_ASSERT(peer->context);
326
327
0
  rdp = peer->context->rdp;
328
0
  status = rdp_check_fds(rdp);
329
330
0
  return (status >= 0);
331
0
}
332
333
static state_run_t peer_recv_data_pdu(freerdp_peer* client, wStream* s,
334
                                      WINPR_ATTR_UNUSED UINT16 totalLength)
335
0
{
336
0
  BYTE type = 0;
337
0
  UINT16 length = 0;
338
0
  UINT32 share_id = 0;
339
0
  BYTE compressed_type = 0;
340
0
  UINT16 compressed_len = 0;
341
0
  rdpUpdate* update = nullptr;
342
343
0
  WINPR_ASSERT(s);
344
0
  WINPR_ASSERT(client);
345
0
  WINPR_ASSERT(client->context);
346
0
  rdpRdp* rdp = client->context->rdp;
347
0
  WINPR_ASSERT(rdp);
348
0
  WINPR_ASSERT(rdp->mcs);
349
350
0
  update = client->context->update;
351
0
  WINPR_ASSERT(update);
352
353
0
  if (!rdp_read_share_data_header(rdp, s, &length, &type, &share_id, &compressed_type,
354
0
                                  &compressed_len))
355
0
    return STATE_RUN_FAILED;
356
357
#ifdef WITH_DEBUG_RDP
358
  WLog_Print(rdp->log, WLOG_DEBUG, "recv %s Data PDU (0x%02" PRIX8 "), length: %" PRIu16 "",
359
             data_pdu_type_to_string(type), type, length);
360
#endif
361
362
0
  switch (type)
363
0
  {
364
0
    case DATA_PDU_TYPE_SYNCHRONIZE:
365
0
      if (!rdp_recv_client_synchronize_pdu(rdp, s))
366
0
        return STATE_RUN_FAILED;
367
368
0
      break;
369
370
0
    case DATA_PDU_TYPE_CONTROL:
371
0
      if (!rdp_server_accept_client_control_pdu(rdp, s))
372
0
        return STATE_RUN_FAILED;
373
374
0
      break;
375
376
0
    case DATA_PDU_TYPE_INPUT:
377
0
      if (!input_recv(rdp->input, s))
378
0
        return STATE_RUN_FAILED;
379
380
0
      break;
381
382
0
    case DATA_PDU_TYPE_BITMAP_CACHE_PERSISTENT_LIST:
383
0
      if (!rdp_server_accept_client_persistent_key_list_pdu(rdp, s))
384
0
        return STATE_RUN_FAILED;
385
0
      break;
386
387
0
    case DATA_PDU_TYPE_FONT_LIST:
388
0
      if (!rdp_server_accept_client_font_list_pdu(rdp, s))
389
0
        return STATE_RUN_FAILED;
390
391
0
      return STATE_RUN_CONTINUE; // State changed, trigger rerun
392
393
0
    case DATA_PDU_TYPE_SHUTDOWN_REQUEST:
394
0
      mcs_send_disconnect_provider_ultimatum(rdp->mcs,
395
0
                                             Disconnect_Ultimatum_provider_initiated);
396
0
      WLog_WARN(TAG, "disconnect provider ultimatum sent to peer, closing connection");
397
0
      return STATE_RUN_QUIT_SESSION;
398
399
0
    case DATA_PDU_TYPE_FRAME_ACKNOWLEDGE:
400
0
      if (!Stream_CheckAndLogRequiredLength(TAG, s, 4))
401
0
        return STATE_RUN_FAILED;
402
403
0
      Stream_Read_UINT32(s, client->ack_frame_id);
404
0
      if (update->SurfaceFrameAcknowledge)
405
0
      {
406
0
        if (!update->SurfaceFrameAcknowledge(update->context, client->ack_frame_id))
407
0
          return STATE_RUN_FAILED;
408
0
      }
409
0
      break;
410
411
0
    case DATA_PDU_TYPE_REFRESH_RECT:
412
0
      if (!update_read_refresh_rect(update, s))
413
0
        return STATE_RUN_FAILED;
414
415
0
      break;
416
417
0
    case DATA_PDU_TYPE_SUPPRESS_OUTPUT:
418
0
      if (!update_read_suppress_output(update, s))
419
0
        return STATE_RUN_FAILED;
420
421
0
      break;
422
423
0
    default:
424
0
      WLog_ERR(TAG, "Data PDU type %" PRIu8 "", type);
425
0
      break;
426
0
  }
427
428
0
  return STATE_RUN_SUCCESS;
429
0
}
430
431
static state_run_t peer_recv_tpkt_pdu(freerdp_peer* client, wStream* s)
432
0
{
433
0
  state_run_t rc = STATE_RUN_SUCCESS;
434
0
  UINT16 length = 0;
435
0
  UINT16 pduType = 0;
436
0
  UINT16 pduSource = 0;
437
0
  UINT16 channelId = 0;
438
0
  UINT16 securityFlags = 0;
439
440
0
  WINPR_ASSERT(s);
441
0
  WINPR_ASSERT(client);
442
0
  WINPR_ASSERT(client->context);
443
444
0
  rdpRdp* rdp = client->context->rdp;
445
0
  WINPR_ASSERT(rdp);
446
0
  WINPR_ASSERT(rdp->mcs);
447
448
0
  rdpSettings* settings = client->context->settings;
449
0
  WINPR_ASSERT(settings);
450
451
0
  if (!rdp_read_header(rdp, s, &length, &channelId))
452
0
    return STATE_RUN_FAILED;
453
454
0
  rdp->inPackets++;
455
0
  if (freerdp_shall_disconnect_context(rdp->context))
456
0
    return STATE_RUN_SUCCESS;
457
458
0
  if (rdp_get_state(rdp) <= CONNECTION_STATE_LICENSING)
459
0
  {
460
0
    return rdp_handle_message_channel(rdp, s, channelId, length);
461
0
  }
462
463
0
  if (!rdp_handle_optional_rdp_decryption(rdp, s, &length, &securityFlags))
464
0
    return STATE_RUN_FAILED;
465
466
0
  if (channelId == MCS_GLOBAL_CHANNEL_ID)
467
0
  {
468
0
    char buffer[256] = WINPR_C_ARRAY_INIT;
469
0
    UINT16 pduLength = 0;
470
0
    UINT16 remain = 0;
471
0
    if (!rdp_read_share_control_header(rdp, s, &pduLength, &remain, &pduType, &pduSource))
472
0
      return STATE_RUN_FAILED;
473
474
0
    settings->PduSource = pduSource;
475
476
0
    WLog_DBG(TAG, "Received %s", pdu_type_to_str(pduType, buffer, sizeof(buffer)));
477
0
    switch (pduType)
478
0
    {
479
0
      case PDU_TYPE_DATA:
480
0
        rc = peer_recv_data_pdu(client, s, pduLength);
481
0
        break;
482
483
0
      case PDU_TYPE_CONFIRM_ACTIVE:
484
0
        if (!rdp_server_accept_confirm_active(rdp, s, pduLength))
485
0
          return STATE_RUN_FAILED;
486
487
0
        break;
488
489
0
      case PDU_TYPE_FLOW_RESPONSE:
490
0
      case PDU_TYPE_FLOW_STOP:
491
0
      case PDU_TYPE_FLOW_TEST:
492
0
        if (!Stream_SafeSeek(s, remain))
493
0
        {
494
0
          WLog_WARN(TAG, "Short PDU, need %" PRIu16 " bytes, got %" PRIuz, remain,
495
0
                    Stream_GetRemainingLength(s));
496
0
          return STATE_RUN_FAILED;
497
0
        }
498
0
        break;
499
500
0
      default:
501
0
        WLog_ERR(TAG, "Client sent unknown pduType %" PRIu16 "", pduType);
502
0
        return STATE_RUN_FAILED;
503
0
    }
504
0
  }
505
0
  else if ((rdp->mcs->messageChannelId > 0) && (channelId == rdp->mcs->messageChannelId))
506
0
  {
507
0
    if (!settings->UseRdpSecurityLayer)
508
0
    {
509
0
      if (!rdp_read_security_header(rdp, s, &securityFlags, nullptr))
510
0
        return STATE_RUN_FAILED;
511
0
    }
512
513
0
    return rdp_recv_message_channel_pdu(rdp, s, securityFlags);
514
0
  }
515
0
  else
516
0
  {
517
0
    if (!freerdp_channel_peer_process(client, s, channelId))
518
0
      return STATE_RUN_FAILED;
519
0
  }
520
0
  if (!tpkt_ensure_stream_consumed(rdp->log, s, length))
521
0
    return STATE_RUN_FAILED;
522
523
0
  return rc;
524
0
}
525
526
static state_run_t peer_recv_handle_auto_detect(freerdp_peer* client, wStream* s)
527
0
{
528
0
  state_run_t ret = STATE_RUN_FAILED;
529
0
  rdpRdp* rdp = nullptr;
530
531
0
  WINPR_ASSERT(client);
532
0
  WINPR_ASSERT(s);
533
0
  WINPR_ASSERT(client->context);
534
535
0
  rdp = client->context->rdp;
536
0
  WINPR_ASSERT(rdp);
537
538
0
  const rdpSettings* settings = client->context->settings;
539
0
  WINPR_ASSERT(settings);
540
541
0
  if (freerdp_settings_get_bool(settings, FreeRDP_NetworkAutoDetect))
542
0
  {
543
0
    switch (rdp_get_state(rdp))
544
0
    {
545
0
      case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_REQUEST:
546
0
        autodetect_on_connect_time_auto_detect_begin(rdp->autodetect);
547
0
        switch (autodetect_get_state(rdp->autodetect))
548
0
        {
549
0
          case FREERDP_AUTODETECT_STATE_REQUEST:
550
0
            ret = STATE_RUN_SUCCESS;
551
0
            if (!rdp_server_transition_to_state(
552
0
                    rdp, CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_RESPONSE))
553
0
              return STATE_RUN_FAILED;
554
0
            break;
555
0
          case FREERDP_AUTODETECT_STATE_COMPLETE:
556
0
            ret = STATE_RUN_CONTINUE; /* Rerun in next state */
557
0
            if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_LICENSING))
558
0
              return STATE_RUN_FAILED;
559
0
            break;
560
0
          default:
561
0
            break;
562
0
        }
563
0
        break;
564
0
      case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_RESPONSE:
565
0
        ret = peer_recv_pdu(client, s);
566
0
        if (state_run_success(ret))
567
0
        {
568
0
          autodetect_on_connect_time_auto_detect_progress(rdp->autodetect);
569
0
          switch (autodetect_get_state(rdp->autodetect))
570
0
          {
571
0
            case FREERDP_AUTODETECT_STATE_REQUEST:
572
0
              ret = STATE_RUN_SUCCESS;
573
0
              break;
574
0
            case FREERDP_AUTODETECT_STATE_COMPLETE:
575
0
              ret = STATE_RUN_CONTINUE; /* Rerun in next state */
576
0
              if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_LICENSING))
577
0
                return STATE_RUN_FAILED;
578
0
              break;
579
0
            default:
580
0
              break;
581
0
          }
582
0
        }
583
0
        break;
584
0
      default:
585
0
        WINPR_ASSERT(FALSE);
586
0
        break;
587
0
    }
588
0
  }
589
0
  else
590
0
  {
591
0
    if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_LICENSING))
592
0
      return STATE_RUN_FAILED;
593
594
0
    ret = STATE_RUN_CONTINUE; /* Rerun in next state */
595
0
  }
596
597
0
  return ret;
598
0
}
599
600
static state_run_t peer_recv_handle_licensing(freerdp_peer* client, wStream* s)
601
0
{
602
0
  state_run_t ret = STATE_RUN_FAILED;
603
0
  rdpRdp* rdp = nullptr;
604
0
  rdpSettings* settings = nullptr;
605
606
0
  WINPR_ASSERT(client);
607
0
  WINPR_ASSERT(s);
608
0
  WINPR_ASSERT(client->context);
609
610
0
  rdp = client->context->rdp;
611
0
  WINPR_ASSERT(rdp);
612
613
0
  settings = rdp->settings;
614
0
  WINPR_ASSERT(settings);
615
616
0
  switch (license_get_state(rdp->license))
617
0
  {
618
0
    case LICENSE_STATE_INITIAL:
619
0
    {
620
0
      const BOOL required =
621
0
          freerdp_settings_get_bool(settings, FreeRDP_ServerLicenseRequired);
622
623
0
      if (required)
624
0
      {
625
0
        if (!license_server_configure(rdp->license))
626
0
          ret = STATE_RUN_FAILED;
627
0
        else if (!license_server_send_request(rdp->license))
628
0
          ret = STATE_RUN_FAILED;
629
0
        else
630
0
          ret = STATE_RUN_SUCCESS;
631
0
      }
632
0
      else
633
0
      {
634
0
        if (license_send_valid_client_error_packet(rdp))
635
0
          ret = STATE_RUN_CONTINUE; /* Rerun in next state, might be capabilities */
636
0
      }
637
0
    }
638
0
    break;
639
0
    case LICENSE_STATE_COMPLETED:
640
0
      ret = STATE_RUN_CONTINUE; /* Licensing completed, continue in next state */
641
0
      break;
642
0
    case LICENSE_STATE_ABORTED:
643
0
      ret = STATE_RUN_FAILED;
644
0
      break;
645
0
    default:
646
0
      ret = peer_recv_pdu(client, s);
647
0
      break;
648
0
  }
649
650
0
  return ret;
651
0
}
652
653
static state_run_t peer_recv_fastpath_pdu(freerdp_peer* client, wStream* s)
654
0
{
655
0
  rdpRdp* rdp = nullptr;
656
0
  UINT16 length = 0;
657
0
  BOOL rc = 0;
658
0
  rdpFastPath* fastpath = nullptr;
659
660
0
  WINPR_ASSERT(s);
661
0
  WINPR_ASSERT(client);
662
0
  WINPR_ASSERT(client->context);
663
664
0
  rdp = client->context->rdp;
665
0
  WINPR_ASSERT(rdp);
666
667
0
  fastpath = rdp->fastpath;
668
0
  WINPR_ASSERT(fastpath);
669
670
0
  rc = fastpath_read_header_rdp(fastpath, s, &length);
671
672
0
  if (!rc || (length == 0))
673
0
  {
674
0
    WLog_ERR(TAG, "incorrect FastPath PDU header length %" PRIu16 "", length);
675
0
    return STATE_RUN_FAILED;
676
0
  }
677
0
  if (!Stream_CheckAndLogRequiredLength(TAG, s, length))
678
0
    return STATE_RUN_FAILED;
679
680
0
  if (!fastpath_decrypt(fastpath, s, &length))
681
0
    return STATE_RUN_FAILED;
682
683
0
  rdp->inPackets++;
684
685
0
  return fastpath_recv_inputs(fastpath, s);
686
0
}
687
688
state_run_t peer_recv_pdu(freerdp_peer* client, wStream* s)
689
0
{
690
0
  int rc = tpkt_verify_header(s);
691
692
0
  if (rc > 0)
693
0
    return peer_recv_tpkt_pdu(client, s);
694
0
  else if (rc == 0)
695
0
    return peer_recv_fastpath_pdu(client, s);
696
0
  else
697
0
    return STATE_RUN_FAILED;
698
0
}
699
700
static state_run_t peer_unexpected_client_message(rdpRdp* rdp, UINT32 flag)
701
0
{
702
0
  char buffer[1024] = WINPR_C_ARRAY_INIT;
703
0
  WLog_WARN(TAG, "Unexpected client message in state %s, missing flag %s",
704
0
            rdp_get_state_string(rdp), rdp_finalize_flags_to_str(flag, buffer, sizeof(buffer)));
705
0
  return STATE_RUN_SUCCESS; /* we ignore this as per spec input PDU are already allowed */
706
0
}
707
708
state_run_t rdp_peer_handle_state_demand_active(freerdp_peer* client)
709
0
{
710
0
  state_run_t ret = STATE_RUN_FAILED;
711
712
0
  WINPR_ASSERT(client);
713
0
  WINPR_ASSERT(client->context);
714
715
0
  rdpRdp* rdp = client->context->rdp;
716
0
  WINPR_ASSERT(rdp);
717
718
0
  if (client->Capabilities && !client->Capabilities(client))
719
0
  {
720
0
    WLog_ERR(TAG, "[%s] freerdp_peer::Capabilities() callback failed",
721
0
             rdp_get_state_string(rdp));
722
0
  }
723
0
  else if (!rdp_send_demand_active(rdp))
724
0
  {
725
0
    WLog_ERR(TAG, "[%s] rdp_send_demand_active() fail", rdp_get_state_string(rdp));
726
0
  }
727
0
  else
728
0
  {
729
0
    if (!rdp_server_transition_to_state(rdp,
730
0
                                        CONNECTION_STATE_CAPABILITIES_EXCHANGE_MONITOR_LAYOUT))
731
0
      return STATE_RUN_FAILED;
732
0
    ret = STATE_RUN_CONTINUE;
733
0
  }
734
0
  return ret;
735
0
}
736
737
/** \brief Handle server peer state ACTIVE:
738
 *  On initial run (not connected, not activated) do not read data
739
 *
740
 *  \return -1 in case of an error, 0 if no data needs to be processed, 1 to let
741
 *  the state machine run again and 2 if peer_recv_pdu must be called.
742
 */
743
static state_run_t rdp_peer_handle_state_active(freerdp_peer* client)
744
0
{
745
0
  state_run_t ret = STATE_RUN_FAILED;
746
747
0
  WINPR_ASSERT(client);
748
0
  WINPR_ASSERT(client->context);
749
750
0
  if (!client->connected)
751
0
  {
752
    /**
753
     * PostConnect should only be called once and should not
754
     * be called after a reactivation sequence.
755
     */
756
0
    IFCALLRET(client->PostConnect, client->connected, client);
757
0
  }
758
0
  if (!client->connected)
759
0
  {
760
0
    WLog_ERR(TAG, "PostConnect for peer %p failed", WINPR_CXX_COMPAT_CAST(const void*, client));
761
0
    ret = STATE_RUN_FAILED;
762
0
  }
763
0
  else if (!client->activated)
764
0
  {
765
0
    BOOL activated = TRUE;
766
767
    /*  Set client->activated TRUE before calling the Activate callback.
768
     *  the Activate callback might reset the client->activated flag even if it returns success
769
     * (e.g. deactivate/reactivate sequence) */
770
0
    client->activated = TRUE;
771
0
    IFCALLRET(client->Activate, activated, client);
772
773
0
    if (!activated)
774
0
    {
775
0
      WLog_ERR(TAG, "Activate for peer %p failed",
776
0
               WINPR_CXX_COMPAT_CAST(const void*, client));
777
0
      ret = STATE_RUN_FAILED;
778
0
    }
779
0
    else
780
0
      ret = STATE_RUN_SUCCESS;
781
0
  }
782
0
  else
783
0
    ret = STATE_RUN_ACTIVE;
784
0
  return ret;
785
0
}
786
787
static state_run_t peer_recv_callback_internal(WINPR_ATTR_UNUSED rdpTransport* transport,
788
                                               wStream* s, void* extra)
789
0
{
790
0
  freerdp_peer* client = (freerdp_peer*)extra;
791
0
  state_run_t ret = STATE_RUN_FAILED;
792
793
0
  WINPR_ASSERT(transport);
794
0
  WINPR_ASSERT(client);
795
0
  WINPR_ASSERT(client->context);
796
797
0
  rdpRdp* rdp = client->context->rdp;
798
0
  WINPR_ASSERT(rdp);
799
800
0
  rdpSettings* settings = client->context->settings;
801
0
  WINPR_ASSERT(settings);
802
803
0
  if (client->ReachedState)
804
0
  {
805
0
    if (!client->ReachedState(client, rdp_get_state(rdp)))
806
0
      return STATE_RUN_FAILED;
807
0
  }
808
0
  switch (rdp_get_state(rdp))
809
0
  {
810
0
    case CONNECTION_STATE_INITIAL:
811
0
      if (!freerdp_settings_enforce_consistency(settings))
812
0
        ret = STATE_RUN_FAILED;
813
0
      else if (rdp_server_transition_to_state(rdp, CONNECTION_STATE_NEGO))
814
0
        ret = STATE_RUN_CONTINUE;
815
0
      break;
816
817
0
    case CONNECTION_STATE_NEGO:
818
0
      if (!rdp_server_accept_nego(rdp, s))
819
0
      {
820
0
        WLog_ERR(TAG, "%s - rdp_server_accept_nego() fail", rdp_get_state_string(rdp));
821
0
      }
822
0
      else
823
0
      {
824
0
        const UINT32 SelectedProtocol = nego_get_selected_protocol(rdp->nego);
825
826
0
        settings->RdstlsSecurity = (SelectedProtocol & PROTOCOL_RDSTLS) != 0;
827
0
        settings->NlaSecurity = (SelectedProtocol & PROTOCOL_HYBRID) != 0;
828
0
        settings->TlsSecurity = (SelectedProtocol & PROTOCOL_SSL) != 0;
829
0
        settings->RdpSecurity = (SelectedProtocol == PROTOCOL_RDP) != 0;
830
831
0
        client->authenticated = FALSE;
832
0
        if (SelectedProtocol & PROTOCOL_HYBRID)
833
0
        {
834
0
          SEC_WINNT_AUTH_IDENTITY_INFO* identity =
835
0
              (SEC_WINNT_AUTH_IDENTITY_INFO*)nego_get_identity(rdp->nego);
836
0
          if (sspi_CopyAuthIdentity(&client->identity, identity) >= 0)
837
0
          {
838
0
            client->authenticated =
839
0
                IFCALLRESULT(TRUE, client->Logon, client, &client->identity, TRUE);
840
0
          }
841
0
          nego_free_nla(rdp->nego);
842
0
        }
843
0
        else
844
0
        {
845
0
          client->authenticated =
846
0
              IFCALLRESULT(TRUE, client->Logon, client, &client->identity, FALSE);
847
0
        }
848
0
        if (!client->authenticated)
849
0
          ret = STATE_RUN_FAILED;
850
0
        else
851
0
        {
852
0
          if (rdp_server_transition_to_state(rdp, CONNECTION_STATE_MCS_CREATE_REQUEST))
853
0
            ret = STATE_RUN_SUCCESS;
854
0
        }
855
0
      }
856
0
      break;
857
858
0
    case CONNECTION_STATE_NLA:
859
0
      WINPR_ASSERT(FALSE); // TODO
860
0
      break;
861
862
0
    case CONNECTION_STATE_MCS_CREATE_REQUEST:
863
0
      if (!rdp_server_accept_mcs_connect_initial(rdp, s))
864
0
      {
865
0
        WLog_ERR(TAG,
866
0
                 "%s - "
867
0
                 "rdp_server_accept_mcs_connect_initial() fail",
868
0
                 rdp_get_state_string(rdp));
869
0
      }
870
0
      else
871
0
        ret = STATE_RUN_SUCCESS;
872
873
0
      break;
874
875
0
    case CONNECTION_STATE_MCS_ERECT_DOMAIN:
876
0
      if (!rdp_server_accept_mcs_erect_domain_request(rdp, s))
877
0
      {
878
0
        WLog_ERR(TAG,
879
0
                 "%s - "
880
0
                 "rdp_server_accept_mcs_erect_domain_request() fail",
881
0
                 rdp_get_state_string(rdp));
882
0
      }
883
0
      else
884
0
        ret = STATE_RUN_SUCCESS;
885
886
0
      break;
887
888
0
    case CONNECTION_STATE_MCS_ATTACH_USER:
889
0
      if (!rdp_server_accept_mcs_attach_user_request(rdp, s))
890
0
      {
891
0
        WLog_ERR(TAG,
892
0
                 "%s - "
893
0
                 "rdp_server_accept_mcs_attach_user_request() fail",
894
0
                 rdp_get_state_string(rdp));
895
0
      }
896
0
      else
897
0
        ret = STATE_RUN_SUCCESS;
898
899
0
      break;
900
901
0
    case CONNECTION_STATE_MCS_CHANNEL_JOIN_REQUEST:
902
0
      if (!rdp_server_accept_mcs_channel_join_request(rdp, s))
903
0
      {
904
0
        WLog_ERR(TAG,
905
0
                 "%s - "
906
0
                 "rdp_server_accept_mcs_channel_join_request() fail",
907
0
                 rdp_get_state_string(rdp));
908
0
      }
909
0
      else
910
0
        ret = STATE_RUN_SUCCESS;
911
0
      break;
912
913
0
    case CONNECTION_STATE_RDP_SECURITY_COMMENCEMENT:
914
0
      ret = STATE_RUN_SUCCESS;
915
916
0
      if (!rdp_server_establish_keys(rdp, s))
917
0
      {
918
0
        WLog_ERR(TAG,
919
0
                 "%s - "
920
0
                 "rdp_server_establish_keys() fail",
921
0
                 rdp_get_state_string(rdp));
922
0
        ret = STATE_RUN_FAILED;
923
0
      }
924
925
0
      if (state_run_success(ret))
926
0
      {
927
0
        if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_SECURE_SETTINGS_EXCHANGE))
928
0
          ret = STATE_RUN_FAILED;
929
0
        else if (Stream_GetRemainingLength(s) > 0)
930
0
          ret = STATE_RUN_CONTINUE; /* Rerun function */
931
0
      }
932
0
      break;
933
934
0
    case CONNECTION_STATE_SECURE_SETTINGS_EXCHANGE:
935
0
      if (rdp_recv_client_info(rdp, s))
936
0
      {
937
0
        if (rdp_server_transition_to_state(
938
0
                rdp, CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_REQUEST))
939
0
          ret = STATE_RUN_CONTINUE;
940
0
      }
941
0
      break;
942
943
0
    case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_REQUEST:
944
0
    case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_RESPONSE:
945
0
      ret = peer_recv_handle_auto_detect(client, s);
946
0
      break;
947
948
0
    case CONNECTION_STATE_LICENSING:
949
0
      ret = peer_recv_handle_licensing(client, s);
950
0
      if (ret == STATE_RUN_CONTINUE)
951
0
      {
952
0
        if (!rdp_server_transition_to_state(
953
0
                rdp, CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_REQUEST))
954
0
          ret = STATE_RUN_FAILED;
955
0
      }
956
0
      break;
957
958
0
    case CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_REQUEST:
959
0
      if (settings->SupportMultitransport &&
960
0
          ((settings->MultitransportFlags & INITIATE_REQUEST_PROTOCOL_UDPFECR) != 0))
961
0
      {
962
        /* only UDP reliable for now, nobody does lossy UDP (MS-RDPUDP only) these days */
963
0
        ret = multitransport_server_request(rdp->multitransport,
964
0
                                            INITIATE_REQUEST_PROTOCOL_UDPFECR);
965
0
        switch (ret)
966
0
        {
967
0
          case STATE_RUN_SUCCESS:
968
0
            if (!rdp_server_transition_to_state(
969
0
                    rdp, CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_RESPONSE))
970
0
              ret = STATE_RUN_FAILED;
971
0
            break;
972
0
          case STATE_RUN_CONTINUE:
973
            /* mismatch on the supported kind of UDP transports */
974
0
            if (!rdp_server_transition_to_state(
975
0
                    rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE))
976
0
              ret = STATE_RUN_FAILED;
977
0
            break;
978
0
          default:
979
0
            break;
980
0
        }
981
0
      }
982
0
      else
983
0
      {
984
0
        if (rdp_server_transition_to_state(
985
0
                rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE))
986
0
          ret = STATE_RUN_CONTINUE; /* Rerun, initialize next state */
987
0
      }
988
0
      break;
989
0
    case CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_RESPONSE:
990
0
      ret = peer_recv_pdu(client, s);
991
0
      break;
992
993
0
    case CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE:
994
0
      ret = rdp_peer_handle_state_demand_active(client);
995
0
      break;
996
997
0
    case CONNECTION_STATE_CAPABILITIES_EXCHANGE_MONITOR_LAYOUT:
998
0
      if (freerdp_settings_get_bool(settings, FreeRDP_SupportMonitorLayoutPdu))
999
0
      {
1000
0
        MONITOR_DEF* monitors = nullptr;
1001
1002
0
        if (client->AdjustMonitorsLayout)
1003
0
        {
1004
0
          if (!client->AdjustMonitorsLayout(client))
1005
0
            return STATE_RUN_FAILED;
1006
0
        }
1007
1008
        /* client supports the monitorLayout PDU, let's send him the monitors if any */
1009
0
        ret = STATE_RUN_SUCCESS;
1010
0
        if (freerdp_settings_get_uint32(settings, FreeRDP_MonitorCount) == 0)
1011
0
        {
1012
0
          const UINT32 w = freerdp_settings_get_uint32(settings, FreeRDP_DesktopWidth);
1013
0
          const UINT32 h = freerdp_settings_get_uint32(settings, FreeRDP_DesktopHeight);
1014
0
          const rdpMonitor primary = { .x = 0,
1015
0
                                     .y = 0,
1016
0
                                     .width = WINPR_ASSERTING_INT_CAST(int32_t, w),
1017
0
                                     .height = WINPR_ASSERTING_INT_CAST(int32_t, h),
1018
0
                                     .is_primary = TRUE,
1019
0
                                     .orig_screen = 0,
1020
0
                                     .attributes = { .physicalWidth = w,
1021
0
                                                     .physicalHeight = h,
1022
0
                                                     .orientation =
1023
0
                                                         ORIENTATION_LANDSCAPE,
1024
0
                                                     .desktopScaleFactor = 100,
1025
0
                                                     .deviceScaleFactor = 100 } };
1026
0
          if (!freerdp_settings_set_pointer_array(settings, FreeRDP_MonitorDefArray, 0,
1027
0
                                                  &primary))
1028
0
            ret = STATE_RUN_FAILED;
1029
0
          else if (!freerdp_settings_set_uint32(settings, FreeRDP_MonitorCount, 1))
1030
0
            ret = STATE_RUN_FAILED;
1031
0
        }
1032
0
        if (state_run_failed(ret))
1033
0
        {
1034
0
        }
1035
0
        else if (!display_convert_rdp_monitor_to_monitor_def(
1036
0
                     settings->MonitorCount, settings->MonitorDefArray, &monitors))
1037
0
        {
1038
0
          ret = STATE_RUN_FAILED;
1039
0
        }
1040
0
        else if (!freerdp_display_send_monitor_layout(rdp->context, settings->MonitorCount,
1041
0
                                                      monitors))
1042
0
        {
1043
0
          ret = STATE_RUN_FAILED;
1044
0
        }
1045
0
        else
1046
0
          ret = STATE_RUN_SUCCESS;
1047
0
        free(monitors);
1048
1049
0
        const size_t len = Stream_GetRemainingLength(s);
1050
0
        if (!state_run_failed(ret) && (len > 0))
1051
0
          ret = STATE_RUN_CONTINUE;
1052
0
      }
1053
0
      else
1054
0
      {
1055
0
        const size_t len = Stream_GetRemainingLength(s);
1056
0
        if (len > 0)
1057
0
          ret = STATE_RUN_CONTINUE;
1058
0
        else
1059
0
          ret = STATE_RUN_SUCCESS;
1060
0
      }
1061
0
      if (state_run_success(ret))
1062
0
      {
1063
0
        if (!rdp_server_transition_to_state(
1064
0
                rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE_CONFIRM_ACTIVE))
1065
0
          ret = STATE_RUN_FAILED;
1066
0
      }
1067
0
      break;
1068
1069
0
    case CONNECTION_STATE_CAPABILITIES_EXCHANGE_CONFIRM_ACTIVE:
1070
      /**
1071
       * During reactivation sequence the client might sent some input or channel data
1072
       * before receiving the Deactivate All PDU. We need to process them as usual.
1073
       */
1074
0
      ret = peer_recv_pdu(client, s);
1075
0
      break;
1076
1077
0
    case CONNECTION_STATE_FINALIZATION_SYNC:
1078
0
      ret = peer_recv_pdu(client, s);
1079
0
      if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_SYNCHRONIZE_PDU))
1080
0
      {
1081
0
        if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_FINALIZATION_COOPERATE))
1082
0
          ret = STATE_RUN_FAILED;
1083
0
      }
1084
0
      else
1085
0
        ret = peer_unexpected_client_message(rdp, FINALIZE_CS_SYNCHRONIZE_PDU);
1086
0
      break;
1087
0
    case CONNECTION_STATE_FINALIZATION_COOPERATE:
1088
0
      ret = peer_recv_pdu(client, s);
1089
0
      if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_CONTROL_COOPERATE_PDU))
1090
0
      {
1091
0
        if (!rdp_server_transition_to_state(rdp,
1092
0
                                            CONNECTION_STATE_FINALIZATION_REQUEST_CONTROL))
1093
0
          ret = STATE_RUN_FAILED;
1094
0
      }
1095
0
      else
1096
0
        ret = peer_unexpected_client_message(rdp, FINALIZE_CS_CONTROL_COOPERATE_PDU);
1097
0
      break;
1098
0
    case CONNECTION_STATE_FINALIZATION_REQUEST_CONTROL:
1099
0
      ret = peer_recv_pdu(client, s);
1100
0
      if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_CONTROL_REQUEST_PDU))
1101
0
      {
1102
0
        if (!rdp_send_server_control_granted_pdu(rdp))
1103
0
          ret = STATE_RUN_FAILED;
1104
0
        else if (!rdp_server_transition_to_state(
1105
0
                     rdp, CONNECTION_STATE_FINALIZATION_PERSISTENT_KEY_LIST))
1106
0
          ret = STATE_RUN_FAILED;
1107
0
      }
1108
0
      else
1109
0
        ret = peer_unexpected_client_message(rdp, FINALIZE_CS_CONTROL_REQUEST_PDU);
1110
0
      break;
1111
0
    case CONNECTION_STATE_FINALIZATION_PERSISTENT_KEY_LIST:
1112
0
      if (freerdp_settings_get_bool(settings, FreeRDP_BitmapCachePersistEnabled) &&
1113
0
          !rdp_finalize_is_flag_set(rdp, FINALIZE_DEACTIVATE_REACTIVATE))
1114
0
      {
1115
0
        ret = peer_recv_pdu(client, s);
1116
1117
0
        if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_PERSISTENT_KEY_LIST_PDU))
1118
0
        {
1119
0
          if (!rdp_server_transition_to_state(rdp,
1120
0
                                              CONNECTION_STATE_FINALIZATION_FONT_LIST))
1121
0
            ret = STATE_RUN_FAILED;
1122
0
        }
1123
0
        else
1124
0
          ret = peer_unexpected_client_message(rdp,
1125
0
                                               CONNECTION_STATE_FINALIZATION_FONT_LIST);
1126
0
      }
1127
0
      else
1128
0
      {
1129
0
        if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_FINALIZATION_FONT_LIST))
1130
0
          ret = STATE_RUN_FAILED;
1131
0
        else
1132
0
          ret = STATE_RUN_CONTINUE;
1133
0
      }
1134
0
      break;
1135
0
    case CONNECTION_STATE_FINALIZATION_FONT_LIST:
1136
0
      ret = peer_recv_pdu(client, s);
1137
0
      if (state_run_success(ret))
1138
0
      {
1139
0
        if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_FONT_LIST_PDU))
1140
0
        {
1141
0
          if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_ACTIVE))
1142
0
            ret = STATE_RUN_FAILED;
1143
0
          else
1144
0
          {
1145
0
            update_reset_state(rdp->update);
1146
0
            ret = STATE_RUN_CONTINUE;
1147
0
          }
1148
0
        }
1149
0
        else
1150
0
          ret = peer_unexpected_client_message(rdp, FINALIZE_CS_FONT_LIST_PDU);
1151
0
      }
1152
0
      break;
1153
1154
0
    case CONNECTION_STATE_ACTIVE:
1155
0
      ret = rdp_peer_handle_state_active(client);
1156
0
      if (ret >= STATE_RUN_ACTIVE)
1157
0
        ret = peer_recv_pdu(client, s);
1158
0
      break;
1159
1160
      /* States that must not happen in server state machine */
1161
0
    case CONNECTION_STATE_FINALIZATION_CLIENT_SYNC:
1162
0
    case CONNECTION_STATE_FINALIZATION_CLIENT_COOPERATE:
1163
0
    case CONNECTION_STATE_FINALIZATION_CLIENT_GRANTED_CONTROL:
1164
0
    case CONNECTION_STATE_FINALIZATION_CLIENT_FONT_MAP:
1165
0
    default:
1166
0
      WLog_ERR(TAG, "%s state %" PRId32, rdp_get_state_string(rdp),
1167
0
               WINPR_CXX_COMPAT_CAST(int32_t, rdp_get_state(rdp)));
1168
0
      break;
1169
0
  }
1170
1171
0
  return ret;
1172
0
}
1173
1174
static state_run_t peer_recv_callback(rdpTransport* transport, wStream* s, void* extra)
1175
0
{
1176
0
  char buffer[64] = WINPR_C_ARRAY_INIT;
1177
0
  state_run_t rc = STATE_RUN_FAILED;
1178
0
  const size_t start = Stream_GetPosition(s);
1179
0
  const rdpContext* context = transport_get_context(transport);
1180
0
  DWORD level = WLOG_TRACE;
1181
0
  static wLog* log = nullptr;
1182
0
  if (!log)
1183
0
    log = WLog_Get(TAG);
1184
1185
0
  WINPR_ASSERT(context);
1186
0
  do
1187
0
  {
1188
0
    const rdpRdp* rdp = context->rdp;
1189
0
    const char* old = rdp_get_state_string(rdp);
1190
1191
0
    if (rc == STATE_RUN_TRY_AGAIN)
1192
0
    {
1193
0
      if (!Stream_SetPosition(s, start))
1194
0
        return STATE_RUN_FAILED;
1195
0
    }
1196
0
    rc = peer_recv_callback_internal(transport, s, extra);
1197
1198
0
    const size_t len = Stream_GetRemainingLength(s);
1199
0
    if ((len > 0) && !state_run_continue(rc))
1200
0
      level = WLOG_WARN;
1201
0
    WLog_Print(log, level,
1202
0
               "(server)[%s -> %s] current return %s [%" PRIuz " bytes not processed]", old,
1203
0
               rdp_get_state_string(rdp), state_run_result_string(rc, buffer, sizeof(buffer)),
1204
0
               len);
1205
0
  } while (state_run_continue(rc));
1206
1207
0
  return rc;
1208
0
}
1209
1210
static BOOL freerdp_peer_close(freerdp_peer* client)
1211
0
{
1212
0
  UINT32 SelectedProtocol = 0;
1213
0
  rdpContext* context = nullptr;
1214
1215
0
  WINPR_ASSERT(client);
1216
1217
0
  context = client->context;
1218
0
  WINPR_ASSERT(context);
1219
0
  WINPR_ASSERT(context->settings);
1220
0
  WINPR_ASSERT(context->rdp);
1221
1222
  /** if negotiation has failed, we're not MCS connected. So don't
1223
   *  send anything else, or some mstsc will consider that as an error
1224
   */
1225
0
  SelectedProtocol = nego_get_selected_protocol(context->rdp->nego);
1226
1227
0
  if (SelectedProtocol & PROTOCOL_FAILED_NEGO)
1228
0
    return TRUE;
1229
1230
  /**
1231
   * [MS-RDPBCGR] 1.3.1.4.2 User-Initiated Disconnection Sequence on Server
1232
   * The server first sends the client a Deactivate All PDU followed by an
1233
   * optional MCS Disconnect Provider Ultimatum PDU.
1234
   */
1235
0
  if (!rdp_send_deactivate_all(context->rdp))
1236
0
    return FALSE;
1237
1238
0
  if (freerdp_settings_get_bool(context->settings, FreeRDP_SupportErrorInfoPdu))
1239
0
  {
1240
0
    if (!rdp_send_error_info(context->rdp))
1241
0
      return FALSE;
1242
0
  }
1243
1244
0
  return mcs_send_disconnect_provider_ultimatum(context->rdp->mcs,
1245
0
                                                Disconnect_Ultimatum_provider_initiated);
1246
0
}
1247
1248
static void freerdp_peer_disconnect(freerdp_peer* client)
1249
0
{
1250
0
  rdpTransport* transport = nullptr;
1251
0
  WINPR_ASSERT(client);
1252
1253
0
  transport = freerdp_get_transport(client->context);
1254
0
  transport_disconnect(transport);
1255
0
}
1256
1257
static BOOL freerdp_peer_send_channel_data(freerdp_peer* client, UINT16 channelId, const BYTE* data,
1258
                                           size_t size)
1259
0
{
1260
0
  WINPR_ASSERT(client);
1261
0
  WINPR_ASSERT(client->context);
1262
0
  WINPR_ASSERT(client->context->rdp);
1263
0
  return rdp_send_channel_data(client->context->rdp, channelId, data, size);
1264
0
}
1265
1266
static BOOL freerdp_peer_send_server_redirection_pdu(freerdp_peer* peer,
1267
                                                     const rdpRedirection* redirection)
1268
0
{
1269
0
  BOOL rc = FALSE;
1270
0
  WINPR_ASSERT(peer);
1271
0
  WINPR_ASSERT(peer->context);
1272
1273
0
  UINT16 sec_flags = 0;
1274
0
  wStream* s = rdp_send_stream_pdu_init(peer->context->rdp, &sec_flags);
1275
0
  if (!s)
1276
0
    return FALSE;
1277
0
  if (!rdp_write_enhanced_security_redirection_packet(s, redirection))
1278
0
    goto fail;
1279
0
  if (!rdp_send_pdu(peer->context->rdp, s, PDU_TYPE_SERVER_REDIRECTION, 0, sec_flags))
1280
0
    goto fail;
1281
0
  rc = rdp_reset_runtime_settings(peer->context->rdp);
1282
0
fail:
1283
0
  Stream_Release(s);
1284
0
  return rc;
1285
0
}
1286
1287
static BOOL freerdp_peer_send_channel_packet(freerdp_peer* client, UINT16 channelId,
1288
                                             size_t totalSize, UINT32 flags, const BYTE* data,
1289
                                             size_t chunkSize)
1290
0
{
1291
0
  WINPR_ASSERT(client);
1292
0
  WINPR_ASSERT(client->context);
1293
0
  WINPR_ASSERT(client->context->rdp);
1294
0
  return rdp_channel_send_packet(client->context->rdp, channelId, totalSize, flags, data,
1295
0
                                 chunkSize);
1296
0
}
1297
1298
static BOOL freerdp_peer_is_write_blocked(freerdp_peer* peer)
1299
0
{
1300
0
  rdpTransport* transport = nullptr;
1301
0
  WINPR_ASSERT(peer);
1302
0
  WINPR_ASSERT(peer->context);
1303
0
  WINPR_ASSERT(peer->context->rdp);
1304
0
  WINPR_ASSERT(peer->context->rdp->transport);
1305
0
  transport = peer->context->rdp->transport;
1306
0
  return transport_is_write_blocked(transport);
1307
0
}
1308
1309
static int freerdp_peer_drain_output_buffer(freerdp_peer* peer)
1310
0
{
1311
0
  rdpTransport* transport = nullptr;
1312
0
  WINPR_ASSERT(peer);
1313
0
  WINPR_ASSERT(peer->context);
1314
0
  WINPR_ASSERT(peer->context->rdp);
1315
0
  WINPR_ASSERT(peer->context->rdp->transport);
1316
0
  transport = peer->context->rdp->transport;
1317
0
  return transport_drain_output_buffer(transport);
1318
0
}
1319
1320
static BOOL freerdp_peer_has_more_to_read(freerdp_peer* peer)
1321
0
{
1322
0
  WINPR_ASSERT(peer);
1323
0
  WINPR_ASSERT(peer->context);
1324
0
  WINPR_ASSERT(peer->context->rdp);
1325
0
  return transport_have_more_bytes_to_read(peer->context->rdp->transport);
1326
0
}
1327
1328
static LicenseCallbackResult freerdp_peer_nolicense(freerdp_peer* peer,
1329
                                                    WINPR_ATTR_UNUSED wStream* s)
1330
0
{
1331
0
  rdpRdp* rdp = nullptr;
1332
1333
0
  WINPR_ASSERT(peer);
1334
0
  WINPR_ASSERT(peer->context);
1335
1336
0
  rdp = peer->context->rdp;
1337
1338
0
  if (!license_send_valid_client_error_packet(rdp))
1339
0
  {
1340
0
    WLog_ERR(TAG, "freerdp_peer_nolicense: license_send_valid_client_error_packet() failed");
1341
0
    return LICENSE_CB_ABORT;
1342
0
  }
1343
1344
0
  return LICENSE_CB_COMPLETED;
1345
0
}
1346
1347
BOOL freerdp_peer_context_new(freerdp_peer* client)
1348
7.31k
{
1349
7.31k
  return freerdp_peer_context_new_ex(client, nullptr);
1350
7.31k
}
1351
1352
void freerdp_peer_context_free(freerdp_peer* client)
1353
7.31k
{
1354
7.31k
  if (!client)
1355
0
    return;
1356
1357
7.31k
  IFCALL(client->ContextFree, client, client->context);
1358
1359
7.31k
  if (client->context)
1360
7.31k
  {
1361
7.31k
    rdpContext* ctx = client->context;
1362
1363
7.31k
    (void)CloseHandle(ctx->channelErrorEvent);
1364
7.31k
    ctx->channelErrorEvent = nullptr;
1365
7.31k
    free(ctx->errorDescription);
1366
7.31k
    ctx->errorDescription = nullptr;
1367
7.31k
    rdp_free(ctx->rdp);
1368
7.31k
    ctx->rdp = nullptr;
1369
7.31k
    metrics_free(ctx->metrics);
1370
7.31k
    ctx->metrics = nullptr;
1371
7.31k
    stream_dump_free(ctx->dump);
1372
7.31k
    ctx->dump = nullptr;
1373
7.31k
    free(ctx);
1374
7.31k
  }
1375
7.31k
  client->context = nullptr;
1376
7.31k
}
1377
1378
static const char* os_major_type_to_string(UINT16 osMajorType)
1379
0
{
1380
0
  switch (osMajorType)
1381
0
  {
1382
0
    case OSMAJORTYPE_UNSPECIFIED:
1383
0
      return "Unspecified platform";
1384
0
    case OSMAJORTYPE_WINDOWS:
1385
0
      return "Windows platform";
1386
0
    case OSMAJORTYPE_OS2:
1387
0
      return "OS/2 platform";
1388
0
    case OSMAJORTYPE_MACINTOSH:
1389
0
      return "Macintosh platform";
1390
0
    case OSMAJORTYPE_UNIX:
1391
0
      return "UNIX platform";
1392
0
    case OSMAJORTYPE_IOS:
1393
0
      return "iOS platform";
1394
0
    case OSMAJORTYPE_OSX:
1395
0
      return "OS X platform";
1396
0
    case OSMAJORTYPE_ANDROID:
1397
0
      return "Android platform";
1398
0
    case OSMAJORTYPE_CHROME_OS:
1399
0
      return "Chrome OS platform";
1400
0
    default:
1401
0
      break;
1402
0
  }
1403
1404
0
  return "Unknown platform";
1405
0
}
1406
1407
const char* freerdp_peer_os_major_type_string(freerdp_peer* client)
1408
0
{
1409
0
  WINPR_ASSERT(client);
1410
1411
0
  rdpContext* context = client->context;
1412
0
  WINPR_ASSERT(context);
1413
0
  WINPR_ASSERT(context->settings);
1414
1415
0
  const UINT32 osMajorType = freerdp_settings_get_uint32(context->settings, FreeRDP_OsMajorType);
1416
0
  WINPR_ASSERT(osMajorType <= UINT16_MAX);
1417
0
  return os_major_type_to_string((UINT16)osMajorType);
1418
0
}
1419
1420
static const char* os_minor_type_to_string(UINT16 osMinorType)
1421
0
{
1422
0
  switch (osMinorType)
1423
0
  {
1424
0
    case OSMINORTYPE_UNSPECIFIED:
1425
0
      return "Unspecified version";
1426
0
    case OSMINORTYPE_WINDOWS_31X:
1427
0
      return "Windows 3.1x";
1428
0
    case OSMINORTYPE_WINDOWS_95:
1429
0
      return "Windows 95";
1430
0
    case OSMINORTYPE_WINDOWS_NT:
1431
0
      return "Windows NT";
1432
0
    case OSMINORTYPE_OS2_V21:
1433
0
      return "OS/2 2.1";
1434
0
    case OSMINORTYPE_POWER_PC:
1435
0
      return "PowerPC";
1436
0
    case OSMINORTYPE_MACINTOSH:
1437
0
      return "Macintosh";
1438
0
    case OSMINORTYPE_NATIVE_XSERVER:
1439
0
      return "Native X Server";
1440
0
    case OSMINORTYPE_PSEUDO_XSERVER:
1441
0
      return "Pseudo X Server";
1442
0
    case OSMINORTYPE_WINDOWS_RT:
1443
0
      return "Windows RT";
1444
0
    default:
1445
0
      break;
1446
0
  }
1447
1448
0
  return "Unknown version";
1449
0
}
1450
1451
const char* freerdp_peer_os_minor_type_string(freerdp_peer* client)
1452
0
{
1453
0
  WINPR_ASSERT(client);
1454
1455
0
  rdpContext* context = client->context;
1456
0
  WINPR_ASSERT(context);
1457
0
  WINPR_ASSERT(context->settings);
1458
1459
0
  const UINT32 osMinorType = freerdp_settings_get_uint32(context->settings, FreeRDP_OsMinorType);
1460
0
  WINPR_ASSERT(osMinorType <= UINT16_MAX);
1461
0
  return os_minor_type_to_string((UINT16)osMinorType);
1462
0
}
1463
1464
freerdp_peer* freerdp_peer_new(int sockfd)
1465
0
{
1466
0
  freerdp_peer* client = (freerdp_peer*)calloc(1, sizeof(freerdp_peer));
1467
1468
0
  if (!client)
1469
0
    return nullptr;
1470
1471
0
  if (sockfd >= 0)
1472
0
  {
1473
0
    (void)freerdp_tcp_set_nodelay(WLog_Get(TAG), WLOG_DEBUG, sockfd);
1474
0
  }
1475
1476
0
  if (client)
1477
0
  {
1478
0
    client->sockfd = sockfd;
1479
0
    client->ContextSize = sizeof(rdpContext);
1480
0
    client->Initialize = freerdp_peer_initialize;
1481
#if defined(WITH_FREERDP_DEPRECATED)
1482
    client->GetFileDescriptor = freerdp_peer_get_fds;
1483
#endif
1484
0
    client->GetEventHandle = freerdp_peer_get_event_handle;
1485
0
    client->GetEventHandles = freerdp_peer_get_event_handles;
1486
0
    client->CheckFileDescriptor = freerdp_peer_check_fds;
1487
0
    client->Close = freerdp_peer_close;
1488
0
    client->Disconnect = freerdp_peer_disconnect;
1489
0
    client->SendChannelData = freerdp_peer_send_channel_data;
1490
0
    client->SendChannelPacket = freerdp_peer_send_channel_packet;
1491
0
    client->SendServerRedirection = freerdp_peer_send_server_redirection_pdu;
1492
0
    client->IsWriteBlocked = freerdp_peer_is_write_blocked;
1493
0
    client->DrainOutputBuffer = freerdp_peer_drain_output_buffer;
1494
0
    client->HasMoreToRead = freerdp_peer_has_more_to_read;
1495
0
    client->VirtualChannelOpen = freerdp_peer_virtual_channel_open;
1496
0
    client->VirtualChannelClose = freerdp_peer_virtual_channel_close;
1497
0
    client->VirtualChannelWrite = freerdp_peer_virtual_channel_write;
1498
0
    client->VirtualChannelRead = nullptr; /* must be defined by server application */
1499
0
    client->VirtualChannelGetData = freerdp_peer_virtual_channel_get_data;
1500
0
    client->VirtualChannelSetData = freerdp_peer_virtual_channel_set_data;
1501
0
    client->SetState = freerdp_peer_set_state;
1502
0
  }
1503
1504
0
  return client;
1505
0
}
1506
1507
void freerdp_peer_free(freerdp_peer* client)
1508
0
{
1509
0
  if (!client)
1510
0
    return;
1511
1512
0
  sspi_FreeAuthIdentity(&client->identity);
1513
0
  if (client->sockfd >= 0)
1514
0
    closesocket((SOCKET)client->sockfd);
1515
0
  free(client);
1516
0
}
1517
1518
static BOOL freerdp_peer_transport_setup(freerdp_peer* client)
1519
7.31k
{
1520
7.31k
  rdpRdp* rdp = nullptr;
1521
1522
7.31k
  WINPR_ASSERT(client);
1523
7.31k
  WINPR_ASSERT(client->context);
1524
1525
7.31k
  rdp = client->context->rdp;
1526
7.31k
  WINPR_ASSERT(rdp);
1527
1528
7.31k
  if (!transport_attach(rdp->transport, client->sockfd))
1529
0
    return FALSE;
1530
7.31k
  client->sockfd = -1;
1531
1532
7.31k
  if (!transport_set_recv_callbacks(rdp->transport, peer_recv_callback, client))
1533
0
    return FALSE;
1534
1535
7.31k
  if (!transport_set_blocking_mode(rdp->transport, FALSE))
1536
0
    return FALSE;
1537
1538
7.31k
  return TRUE;
1539
7.31k
}
1540
1541
BOOL freerdp_peer_context_new_ex(freerdp_peer* client, const rdpSettings* settings)
1542
7.31k
{
1543
7.31k
  rdpRdp* rdp = nullptr;
1544
7.31k
  rdpContext* context = nullptr;
1545
7.31k
  BOOL ret = TRUE;
1546
1547
7.31k
  if (!client)
1548
0
    return FALSE;
1549
1550
7.31k
  WINPR_ASSERT(client->ContextSize >= sizeof(rdpContext));
1551
7.31k
  if (!(context = (rdpContext*)calloc(1, client->ContextSize)))
1552
0
    goto fail;
1553
1554
7.31k
  client->context = context;
1555
7.31k
  context->peer = client;
1556
7.31k
  context->ServerMode = TRUE;
1557
7.31k
  context->log = WLog_Get(TAG);
1558
7.31k
  if (!context->log)
1559
0
    goto fail;
1560
1561
7.31k
  if (settings)
1562
0
  {
1563
0
    context->settings = freerdp_settings_clone(settings);
1564
0
    if (!context->settings)
1565
0
      goto fail;
1566
0
  }
1567
1568
7.31k
  context->dump = stream_dump_new();
1569
7.31k
  if (!context->dump)
1570
0
    goto fail;
1571
7.31k
  if (!(context->metrics = metrics_new(context)))
1572
0
    goto fail;
1573
1574
7.31k
  if (!(rdp = rdp_new(context)))
1575
0
    goto fail;
1576
1577
7.31k
  rdp_log_build_warnings(rdp);
1578
1579
#if defined(WITH_FREERDP_DEPRECATED)
1580
  client->update = rdp->update;
1581
  client->settings = rdp->settings;
1582
  client->autodetect = rdp->autodetect;
1583
#endif
1584
7.31k
  context->rdp = rdp;
1585
7.31k
  context->input = rdp->input;
1586
7.31k
  context->update = rdp->update;
1587
7.31k
  context->settings = rdp->settings;
1588
7.31k
  context->autodetect = rdp->autodetect;
1589
7.31k
  update_register_server_callbacks(rdp->update);
1590
7.31k
  autodetect_register_server_callbacks(rdp->autodetect);
1591
1592
7.31k
  if (!(context->channelErrorEvent = CreateEvent(nullptr, TRUE, FALSE, nullptr)))
1593
0
  {
1594
0
    WLog_ERR(TAG, "CreateEvent failed!");
1595
0
    goto fail;
1596
0
  }
1597
1598
7.31k
  if (!(context->errorDescription = calloc(1, 500)))
1599
0
  {
1600
0
    WLog_ERR(TAG, "calloc failed!");
1601
0
    goto fail;
1602
0
  }
1603
1604
7.31k
  if (!freerdp_peer_transport_setup(client))
1605
0
    goto fail;
1606
1607
7.31k
  client->IsWriteBlocked = freerdp_peer_is_write_blocked;
1608
7.31k
  client->DrainOutputBuffer = freerdp_peer_drain_output_buffer;
1609
7.31k
  client->HasMoreToRead = freerdp_peer_has_more_to_read;
1610
7.31k
  client->LicenseCallback = freerdp_peer_nolicense;
1611
7.31k
  IFCALLRET(client->ContextNew, ret, client, client->context);
1612
1613
7.31k
  if (!ret)
1614
0
    goto fail;
1615
7.31k
  return TRUE;
1616
1617
0
fail:
1618
0
  WLog_ERR(TAG, "ContextNew callback failed");
1619
0
  freerdp_peer_context_free(client);
1620
0
  return FALSE;
1621
7.31k
}