21#include <freerdp/config.h>
22#include <freerdp/version.h>
24#include "../settings.h"
26#include <winpr/assert.h>
29#include <winpr/synch.h>
30#include <winpr/print.h>
31#include <winpr/stream.h>
32#include <winpr/winsock.h>
33#include <winpr/cred.h>
34#include <winpr/bcrypt.h>
36#include <freerdp/log.h>
37#include <freerdp/error.h>
38#include <freerdp/crypto/certificate.h>
39#include <freerdp/utils/ringbuffer.h>
40#include <freerdp/utils/smartcardlogon.h>
41#include <freerdp/utils/aad.h>
47#include "../credssp_auth.h"
50#include "../../crypto/crypto.h"
51#include "../../crypto/certificate.h"
52#include "../../crypto/opensslcompat.h"
55#include "../redirection.h"
57#include <winpr/json.h>
71typedef struct rdp_arm rdpArm;
73#define TAG FREERDP_TAG("core.gateway.arm")
76static BOOL arm_tls_connect(rdpArm* arm, rdpTls* tls, UINT32 timeout)
82 BIO* socketBio =
nullptr;
83 BIO* bufferedBio =
nullptr;
84 rdpSettings* settings = arm->context->settings;
93 const char* proxyUsername =
nullptr;
94 const char* proxyPassword =
nullptr;
95 BOOL isProxyConnection =
96 proxy_prepare(settings, &peerHostname, &peerPort, &proxyUsername, &proxyPassword);
98 sockfd = freerdp_tcp_connect(arm->context, peerHostname, peerPort, timeout);
100 WLog_Print(arm->log, WLOG_DEBUG,
"connecting to %s %d", peerHostname, peerPort);
104 socketBio = BIO_new(BIO_s_simple_socket());
108 closesocket((SOCKET)sockfd);
112 BIO_set_fd(socketBio, sockfd, BIO_CLOSE);
113 bufferedBio = BIO_new(BIO_s_buffered_socket());
117 BIO_free_all(socketBio);
121 bufferedBio = BIO_push(bufferedBio, socketBio);
125 status = BIO_set_nonblock(bufferedBio, TRUE);
127 if (isProxyConnection)
129 if (!proxy_connect(arm->context, bufferedBio, proxyUsername, proxyPassword,
133 BIO_free_all(bufferedBio);
140 BIO_free_all(bufferedBio);
145 tls->port = MIN(UINT16_MAX, WINPR_ASSERTING_INT_CAST(int32_t, settings->GatewayPort));
146 tls->isGatewayTransport = TRUE;
147 status = freerdp_tls_connect(tls, bufferedBio);
150 rdpContext* context = arm->context;
152 freerdp_set_last_error_if_not(context, FREERDP_ERROR_TLS_CONNECT_FAILED);
154 freerdp_set_last_error_if_not(context, FREERDP_ERROR_CONNECT_CANCELLED);
158 return (status >= 1);
161static BOOL arm_fetch_wellknown(rdpArm* arm)
164 WINPR_ASSERT(arm->context);
165 WINPR_ASSERT(arm->context->rdp);
167 rdpRdp* rdp = arm->context->rdp;
173 const BOOL useTenant =
175 const char* tenantid =
"common";
180 rdp->wellknown = freerdp_utils_aad_get_wellknown(arm->log, base, tenantid);
181 return (rdp->wellknown !=
nullptr);
184static wStream* arm_build_http_request(rdpArm* arm,
const char* method,
185 TRANSFER_ENCODING transferEncoding,
const char* content_type,
186 size_t content_length)
191 WINPR_ASSERT(method);
192 WINPR_ASSERT(content_type);
194 WINPR_ASSERT(arm->context);
195 WINPR_ASSERT(arm->context->rdp);
197 const char* uri = http_context_get_uri(arm->http);
198 HttpRequest* request = http_request_new();
203 rdpSettings* settings = arm->context->settings;
205 if (!http_request_set_method(request, method) || !http_request_set_uri(request, uri))
210 char* token =
nullptr;
212 pGetCommonAccessToken GetCommonAccessToken = freerdp_get_common_access_token(arm->context);
213 if (!GetCommonAccessToken)
215 WLog_Print(arm->log, WLOG_ERROR,
"No authorization token provided");
219 if (!arm_fetch_wellknown(arm))
222 if (!GetCommonAccessToken(arm->context, ACCESS_TOKEN_TYPE_AVD, &token, 0))
224 WLog_Print(arm->log, WLOG_ERROR,
"Unable to obtain access token");
236 if (!http_request_set_auth_scheme(request,
"Bearer") ||
237 !http_request_set_auth_param(
241 if (!http_request_set_transfer_encoding(request, transferEncoding) ||
242 !http_request_set_content_length(request, content_length) ||
243 !http_request_set_content_type(request, content_type))
246 s = http_request_write(arm->http, request);
248 http_request_free(request);
251 Stream_SealLength(s);
256static BOOL arm_send_http_request(rdpArm* arm, rdpTls* tls,
const char* method,
257 const char* content_type,
const char* data,
size_t content_length)
261 arm_build_http_request(arm, method, TransferEncodingIdentity, content_type, content_length);
266 const size_t sz = Stream_Length(s);
267 WLog_Print(arm->log, WLOG_TRACE,
"header [%" PRIuz
"]: %s", sz, Stream_Buffer(s));
268 WLog_Print(arm->log, WLOG_TRACE,
"body [%" PRIuz
"]: %s", content_length, data);
269 status = freerdp_tls_write_all(tls, Stream_Buffer(s), sz);
271 Stream_Free(s, TRUE);
272 if (status >= 0 && content_length > 0 && data)
273 status = freerdp_tls_write_all(tls, (
const BYTE*)data, content_length);
275 return (status >= 0);
278static void arm_free(rdpArm* arm)
283 freerdp_tls_free(arm->tls);
284 http_context_free(arm->http);
289static rdpArm* arm_new(rdpContext* context)
291 WINPR_ASSERT(context);
293 rdpArm* arm = (rdpArm*)calloc(1,
sizeof(rdpArm));
297 arm->log = WLog_Get(TAG);
298 arm->context = context;
299 arm->tls = freerdp_tls_new(context);
303 arm->http = http_context_new();
315static char* arm_create_request_json(rdpArm* arm)
318 char* message =
nullptr;
324 goto arm_create_cleanup;
328 goto arm_create_cleanup;
334 goto arm_create_cleanup;
344 goto arm_create_cleanup;
346 goto arm_create_cleanup;
348 goto arm_create_cleanup;
372static WINPR_CIPHER_CTX* treatAuthBlob(wLog* log,
const BYTE* pbInput,
size_t cbInput,
375 WINPR_CIPHER_CTX* ret =
nullptr;
376 char algoName[100] = WINPR_C_ARRAY_INIT;
378 WINPR_ASSERT(pBlockSize);
379 SSIZE_T algoSz = ConvertWCharNToUtf8((
const WCHAR*)pbInput, cbInput /
sizeof(WCHAR), algoName,
380 sizeof(algoName) - 1);
383 WLog_Print(log, WLOG_ERROR,
"invalid algoName");
387 if (strcmp(algoName,
"AES") != 0)
389 WLog_Print(log, WLOG_ERROR,
"only AES is supported for now");
393 *pBlockSize = WINPR_AES_BLOCK_SIZE;
394 const size_t algoLen = WINPR_ASSERTING_INT_CAST(
size_t, (algoSz + 1)) *
sizeof(WCHAR);
395 if (cbInput < algoLen)
397 WLog_Print(log, WLOG_ERROR,
"invalid AuthBlob size");
404 wStream staticStream = WINPR_C_ARRAY_INIT;
405 wStream* s = Stream_StaticConstInit(&staticStream, &pbInput[algoLen], cbInput);
407 if (!Stream_CheckAndLogRequiredLengthWLog(log, s, 12))
410 const UINT32 dwMagic = Stream_Get_UINT32(s);
411 if (dwMagic != BCRYPT_KEY_DATA_BLOB_MAGIC)
413 WLog_Print(log, WLOG_ERROR,
"unsupported authBlob type");
417 const UINT32 dwVersion = Stream_Get_UINT32(s);
418 if (dwVersion != BCRYPT_KEY_DATA_BLOB_VERSION1)
420 WLog_Print(log, WLOG_ERROR,
"unsupported authBlob version %" PRIu32
", expecting %d",
421 dwVersion, BCRYPT_KEY_DATA_BLOB_VERSION1);
425 const UINT32 cbKeyData = Stream_Get_UINT32(s);
426 if (!Stream_CheckAndLogRequiredLengthWLog(log, s, cbKeyData))
428 WLog_Print(log, WLOG_ERROR,
"invalid authBlob size");
432 WINPR_CIPHER_TYPE cipherType = WINPR_CIPHER_NONE;
436 cipherType = WINPR_CIPHER_AES_128_CBC;
439 cipherType = WINPR_CIPHER_AES_192_CBC;
442 cipherType = WINPR_CIPHER_AES_256_CBC;
445 WLog_Print(log, WLOG_ERROR,
"invalid authBlob cipher size");
449 ret = winpr_Cipher_NewEx(cipherType, WINPR_ENCRYPT, Stream_Pointer(s), cbKeyData,
nullptr, 0);
452 WLog_Print(log, WLOG_ERROR,
"error creating cipher");
456 if (!winpr_Cipher_SetPadding(ret, TRUE))
458 WLog_Print(log, WLOG_ERROR,
"unable to enable padding on cipher");
459 winpr_Cipher_Free(ret);
466static BOOL arm_stringEncodeW(
const BYTE* pin,
size_t cbIn, BYTE** ppOut,
size_t* pcbOut)
472 char* b64encoded = crypto_base64_encode_ex(pin, cbIn, TRUE);
478 *ppOut = (BYTE*)ConvertUtf8NToWCharAlloc(b64encoded, strlen(b64encoded), &outSz);
484 *pcbOut = (outSz + 1) *
sizeof(WCHAR);
488static BOOL arm_encodeRedirectPasswd(wLog* log, rdpSettings* settings,
const rdpCertificate* cert,
489 WINPR_CIPHER_CTX* cipher,
size_t blockSize)
492 BYTE* output =
nullptr;
493 BYTE* finalOutput =
nullptr;
499 size_t wpasswdLen = 0;
503 WLog_Print(log, WLOG_ERROR,
"error when converting password to UTF16");
507 const size_t wpasswdBytes = (wpasswdLen + 1) *
sizeof(WCHAR);
508 BYTE* encryptedPass = calloc(1, wpasswdBytes + blockSize);
514 size_t encryptedPassLen = 0;
515 if (!winpr_Cipher_Update(cipher, wpasswd, wpasswdBytes, encryptedPass, &encryptedPassLen))
518 if (encryptedPassLen > wpasswdBytes)
523 if (!winpr_Cipher_Final(cipher, &encryptedPass[encryptedPassLen], &finalLen))
525 WLog_Print(log, WLOG_ERROR,
"error when ciphering password");
528 encryptedPassLen += finalLen;
533 size_t output_length = 0;
534 if (!freerdp_certificate_publickey_encrypt(cert, encryptedPass, encryptedPassLen,
535 &output, &output_length))
537 WLog_Print(log, WLOG_ERROR,
"unable to encrypt with the server's public key");
542 size_t finalOutputLen = 0;
543 if (!arm_stringEncodeW(output, output_length, &finalOutput, &finalOutputLen))
545 WLog_Print(log, WLOG_ERROR,
"unable to base64+utf16 final blob");
550 finalOutput, finalOutputLen))
552 WLog_Print(log, WLOG_ERROR,
553 "unable to set the redirection password in settings");
560 settings->RdstlsSecurity = TRUE;
561 settings->AadSecurity = FALSE;
562 settings->NlaSecurity = FALSE;
563 settings->RdpSecurity = FALSE;
564 settings->TlsSecurity = FALSE;
565 settings->RedirectionFlags = LB_PASSWORD_IS_PK_ENCRYPTED;
579static BOOL arm_pick_base64Utf16Field(wLog* log,
const WINPR_JSON* json,
const char* name,
580 BYTE** poutput,
size_t* plen)
593 BYTE* output1 =
nullptr;
595 crypto_base64_decode(nodeValue, strlen(nodeValue), &output1, &len1);
596 if (!output1 || !len1)
598 WLog_Print(log, WLOG_ERROR,
"error when first unbase64 for %s", name);
604 char* output2 = ConvertWCharNToUtf8Alloc((WCHAR*)output1, len1 /
sizeof(WCHAR), &len2);
606 if (!output2 || !len2)
608 WLog_Print(log, WLOG_ERROR,
"error when decode('utf-16') for %s", name);
613 BYTE* output =
nullptr;
614 crypto_base64_decode(output2, len2, &output, plen);
616 if (!output || !*plen)
618 WLog_Print(log, WLOG_ERROR,
"error when second unbase64 for %s", name);
647static size_t arm_parse_ipvx_count(WINPR_JSON* ipvX)
658static BOOL arm_parse_ipv6(rdpSettings* settings, WINPR_JSON* ipv6,
size_t* pAddressIdx)
660 WINPR_ASSERT(settings);
662 WINPR_ASSERT(pAddressIdx);
672 for (
size_t j = 0; j < naddresses; j++)
679 if (utils_str_is_empty(addr))
682 if (*pAddressIdx >= count)
684 WLog_ERR(TAG,
"Exceeded TargetNetAddresses, parsing failed");
688 if (!freerdp_settings_set_pointer_array(settings, FreeRDP_TargetNetAddresses,
689 (*pAddressIdx)++, addr))
695static BOOL arm_parse_ipv4(rdpSettings* settings, WINPR_JSON* ipv4,
size_t* pAddressIdx)
697 WINPR_ASSERT(settings);
699 WINPR_ASSERT(pAddressIdx);
707 for (
size_t j = 0; j < naddresses; j++)
713 WINPR_JSON* publicIpNode =
718 if (!utils_str_is_empty(publicIp))
720 if (*pAddressIdx >= count)
722 WLog_ERR(TAG,
"Exceeded TargetNetAddresses, parsing failed");
725 if (!freerdp_settings_set_pointer_array(settings, FreeRDP_TargetNetAddresses,
726 (*pAddressIdx)++, publicIp))
731 WINPR_JSON* privateIpNode =
736 if (!utils_str_is_empty(privateIp))
738 if (*pAddressIdx >= count)
740 WLog_ERR(TAG,
"Exceeded TargetNetAddresses, parsing failed");
743 if (!freerdp_settings_set_pointer_array(settings, FreeRDP_TargetNetAddresses,
744 (*pAddressIdx)++, privateIp))
752static BOOL arm_treat_azureInstanceNetworkMetadata(wLog* log,
const char* metadata,
753 rdpSettings* settings)
757 WINPR_ASSERT(settings);
759 if (!freerdp_target_net_adresses_reset(settings, 0))
765 WLog_Print(log, WLOG_ERROR,
"invalid azureInstanceNetworkMetadata");
778 WLog_Print(log, WLOG_ERROR,
"expecting interface to be an Array");
784 if (interfaceSz == 0)
786 WLog_WARN(TAG,
"no addresses in azure instance metadata");
793 for (
size_t i = 0; i < interfaceSz; i++)
801 count += arm_parse_ipvx_count(ipv6);
805 count += arm_parse_ipvx_count(ipv4);
808 if (!freerdp_target_net_adresses_reset(settings, count))
813 size_t addressIdx = 0;
814 for (
size_t i = 0; i < interfaceSz; i++)
823 if (!arm_parse_ipv6(settings, ipv6, &addressIdx))
830 if (!arm_parse_ipv4(settings, ipv4, &addressIdx))
834 if (addressIdx > UINT32_MAX)
841 ret = addressIdx > 0;
850static void zfree(
char* str)
861static BOOL arm_fill_rdstls(rdpArm* arm, rdpSettings* settings,
const WINPR_JSON* json,
862 const rdpCertificate* redirectedServerCert)
866 BYTE* authBlob =
nullptr;
867 WCHAR* wGUID =
nullptr;
895 WINPR_ASSERT(arm->context);
896 WINPR_ASSERT(arm->context->instance);
898 char* username =
nullptr;
899 char* password =
nullptr;
900 char* domain =
nullptr;
903 domain = _strdup(ddomain);
905 username = _strdup(duser);
908 IFCALLRESULT(FALSE, arm->context->instance->AuthenticateEx, arm->context->instance,
909 &username, &password, &domain, AUTH_RDSTLS);
917 if (!rc || !rc1 || !rc2 || !rc3)
924 WINPR_JSON* redirectedAuthGuidNode =
931 if (!redirectedAuthGuid)
935 size_t wGUID_len = 0;
936 wGUID = ConvertUtf8ToWCharAlloc(redirectedAuthGuid, &wGUID_len);
937 if (!wGUID || (wGUID_len == 0))
939 WLog_Print(arm->log, WLOG_ERROR,
940 "unable to allocate space for redirectedAuthGuid");
946 settings, FreeRDP_RedirectionGuid, wGUID, (wGUID_len + 1) *
sizeof(WCHAR));
950 WLog_Print(arm->log, WLOG_ERROR,
"unable to set RedirectionGuid");
960 size_t authBlobLen = 0;
961 if (!arm_pick_base64Utf16Field(arm->log, json,
"redirectedAuthBlob", &authBlob,
966 size_t blockSize = 0;
967 WINPR_CIPHER_CTX* cipher = treatAuthBlob(arm->log, authBlob, authBlobLen, &blockSize);
972 const BOOL rerp = arm_encodeRedirectPasswd(arm->log, settings, redirectedServerCert,
974 winpr_Cipher_Free(cipher);
989static BOOL arm_fill_gateway_parameters(rdpArm* arm,
const char* message,
size_t len)
992 WINPR_ASSERT(arm->context);
993 WINPR_ASSERT(message);
995 rdpCertificate* redirectedServerCert =
nullptr;
1000 WLog_Print(arm->log, WLOG_ERROR,
"Response data is not valid JSON: %s",
1005 if (WLog_IsLevelActive(arm->log, WLOG_DEBUG))
1008 WLog_Print(arm->log, WLOG_DEBUG,
"Got HTTP Response data: %s", str);
1012 rdpSettings* settings = arm->context->settings;
1017 if (gwurlstr !=
nullptr)
1019 WLog_Print(arm->log, WLOG_DEBUG,
"extracted target url %s", gwurlstr);
1025 WINPR_JSON* serverNameNode =
1039 const char key[] =
"redirectedUsername";
1042 const char* userName =
nullptr;
1052 WINPR_JSON* azureMeta =
1056 if (!arm_treat_azureInstanceNetworkMetadata(
1059 WLog_Print(arm->log, WLOG_ERROR,
1060 "error when treating azureInstanceNetworkMetadata");
1069 BYTE* cert =
nullptr;
1070 if (arm_pick_base64Utf16Field(arm->log, json,
"redirectedServerCert", &cert, &certLen))
1072 const BOOL rc = rdp_redirection_read_target_cert(&redirectedServerCert, cert, certLen);
1076 else if (!rdp_set_target_certificate(settings, redirectedServerCert))
1084 status = arm_fill_rdstls(arm, settings, json, redirectedServerCert);
1088 freerdp_certificate_free(redirectedServerCert);
1092static BOOL arm_handle_request_ok(rdpArm* arm,
const HttpResponse* response)
1094 const size_t len = http_response_get_body_length(response);
1095 const char* msg = http_response_get_body(response);
1096 const size_t alen = strnlen(msg, len + 1);
1099 WLog_Print(arm->log, WLOG_ERROR,
"Got HTTP Response data with invalid termination");
1103 return arm_fill_gateway_parameters(arm, msg, len);
1106static BOOL arm_handle_bad_request(rdpArm* arm,
const HttpResponse* response, BOOL* retry)
1108 WINPR_ASSERT(response);
1109 WINPR_ASSERT(retry);
1115 http_response_log_error_status(WLog_Get(TAG), WLOG_ERROR, response);
1117 const size_t len = http_response_get_body_length(response);
1118 const char* msg = http_response_get_body(response);
1119 if (msg && (strnlen(msg, len + 1) > len))
1121 WLog_Print(arm->log, WLOG_ERROR,
"Got HTTP Response data, but length is invalid");
1126 WLog_Print(arm->log, WLOG_DEBUG,
"Got HTTP Response data: %s", msg);
1129 if (json ==
nullptr)
1132 WLog_Print(arm->log, WLOG_ERROR,
"WINPR_JSON_ParseWithLength: %s", error_ptr);
1140 if (gw_code_str ==
nullptr)
1142 WLog_Print(arm->log, WLOG_ERROR,
"Response has no \"Code\" property");
1146 if (strcmp(gw_code_str,
"E_PROXY_ORCHESTRATION_LB_SESSIONHOST_DEALLOCATED") == 0)
1152 WLog_WARN(TAG,
"Starting your VM. It may take up to 5 minutes");
1154 WLog_WARN(TAG,
"%s", msgstr);
1155 freerdp_set_last_error_if_not(arm->context, FREERDP_ERROR_CONNECT_TARGET_BOOTING);
1169static BOOL arm_handle_request(rdpArm* arm, BOOL* retry, DWORD timeout)
1171 WINPR_ASSERT(retry);
1173 if (!arm_fetch_wellknown(arm))
1181 char* message =
nullptr;
1184 HttpResponse* response =
nullptr;
1185 long StatusCode = 0;
1187 const char* useragent =
1189 const char* msuseragent =
1191 if (!http_context_set_uri(arm->http,
"/api/arm/v2/connections") ||
1192 !http_context_set_accept(arm->http,
"*/*") ||
1193 !http_context_set_cache_control(arm->http,
"no-cache") ||
1194 !http_context_set_pragma(arm->http,
"no-cache") ||
1195 !http_context_set_connection(arm->http,
"Keep-Alive") ||
1196 !http_context_set_user_agent(arm->http, useragent) ||
1197 !http_context_set_x_ms_user_agent(arm->http, msuseragent) ||
1199 FreeRDP_GatewayHostname)))
1202 if (!arm_tls_connect(arm, arm->tls, timeout))
1205 message = arm_create_request_json(arm);
1209 if (!arm_send_http_request(arm, arm->tls,
"POST",
"application/json", message, strlen(message)))
1212 response = http_response_recv(arm->tls, TRUE);
1216 StatusCode = http_response_get_status_code(response);
1217 if (StatusCode == HTTP_STATUS_OK)
1219 if (!arm_handle_request_ok(arm, response))
1222 else if (StatusCode == HTTP_STATUS_BAD_REQUEST)
1224 if (!arm_handle_bad_request(arm, response, retry))
1229 http_response_log_error_status(WLog_Get(TAG), WLOG_ERROR, response);
1235 http_response_free(response);
1242BOOL arm_resolve_endpoint(wLog* log, rdpContext* context, DWORD timeout)
1245 WLog_Print(log, WLOG_ERROR,
"arm gateway support not compiled in");
1252 if (!context->settings)
1259 WLog_Print(log, WLOG_ERROR,
"loadBalanceInfo and RemoteApplicationProgram needed");
1263 rdpArm* arm = arm_new(context);
1273 freerdp* instance = context->instance;
1274 WINPR_ASSERT(instance);
1275 SSIZE_T delay = IFCALLRESULT(-1, instance->RetryDialog, instance,
"arm-transport",
1276 arm->gateway_retry, arm);
1277 arm->gateway_retry++;
1282 WLog_Print(arm->log, WLOG_DEBUG,
"Delay for %" PRIdz
"ms before next attempt",
1286 DWORD slp = (UINT32)delay;
1287 if (delay > UINT32_MAX)
1294 rc = arm_handle_request(arm, &retry, timeout);
1296 }
while (retry && rc);
WINPR_ATTR_NODISCARD WINPR_API char * WINPR_JSON_PrintUnformatted(WINPR_JSON *item)
Serialize a JSON instance to string without formatting for human readable formatted output see WINPR_...
WINPR_ATTR_NODISCARD WINPR_API WINPR_JSON * WINPR_JSON_Parse(const char *value)
Parse a '\0' terminated JSON string.
WINPR_API BOOL WINPR_JSON_HasObjectItem(const WINPR_JSON *object, const char *string)
Check if JSON has an object matching the name.
WINPR_API BOOL WINPR_JSON_IsString(const WINPR_JSON *item)
Check if JSON item is of type String.
WINPR_API WINPR_JSON * WINPR_JSON_CreateObject(void)
WINPR_JSON_CreateObject.
WINPR_API WINPR_JSON * WINPR_JSON_GetArrayItem(const WINPR_JSON *array, size_t index)
Return a pointer to an item in the array.
WINPR_API WINPR_JSON * WINPR_JSON_GetObjectItemCaseSensitive(const WINPR_JSON *object, const char *string)
Same as WINPR_JSON_GetObjectItem but with case sensitive matching.
WINPR_API WINPR_JSON * WINPR_JSON_AddStringToObject(WINPR_JSON *object, const char *name, const char *string)
WINPR_JSON_AddStringToObject.
WINPR_ATTR_NODISCARD WINPR_API WINPR_JSON * WINPR_JSON_ParseWithLength(const char *value, size_t buffer_length)
Parse a JSON string.
WINPR_API const char * WINPR_JSON_GetStringValue(WINPR_JSON *item)
Return the String value of a JSON item.
WINPR_API WINPR_JSON * WINPR_JSON_AddNullToObject(WINPR_JSON *object, const char *name)
WINPR_JSON_AddNullToObject.
WINPR_API void WINPR_JSON_Delete(WINPR_JSON *item)
Delete a WinPR JSON wrapper object.
WINPR_API size_t WINPR_JSON_GetArraySize(const WINPR_JSON *array)
Get the number of arrayitems from an array.
WINPR_API BOOL WINPR_JSON_IsArray(const WINPR_JSON *item)
Check if JSON item is of type Array.
WINPR_API const char * WINPR_JSON_GetErrorPtr(void)
Return an error string.
WINPR_ATTR_NODISCARD FREERDP_API const void * freerdp_settings_get_pointer(const rdpSettings *settings, FreeRDP_Settings_Keys_Pointer id)
Returns a immutable pointer settings value.
FREERDP_API BOOL freerdp_settings_set_uint32(rdpSettings *settings, FreeRDP_Settings_Keys_UInt32 id, UINT32 val)
Sets a UINT32 settings value.
WINPR_ATTR_NODISCARD FREERDP_API const char * freerdp_settings_get_string(const rdpSettings *settings, FreeRDP_Settings_Keys_String id)
Returns a immutable string settings value.
FREERDP_API BOOL freerdp_settings_set_pointer_len(rdpSettings *settings, FreeRDP_Settings_Keys_Pointer id, const void *data, size_t len)
Set a pointer to value data.
WINPR_ATTR_NODISCARD FREERDP_API UINT32 freerdp_settings_get_uint32(const rdpSettings *settings, FreeRDP_Settings_Keys_UInt32 id)
Returns a UINT32 settings value.
WINPR_ATTR_NODISCARD FREERDP_API WCHAR * freerdp_settings_get_string_as_utf16(const rdpSettings *settings, FreeRDP_Settings_Keys_String id, size_t *pCharLen)
Return an allocated UTF16 string.
WINPR_ATTR_NODISCARD FREERDP_API BOOL freerdp_settings_get_bool(const rdpSettings *settings, FreeRDP_Settings_Keys_Bool id)
Returns a boolean settings value.
FREERDP_API BOOL freerdp_settings_set_string(rdpSettings *settings, FreeRDP_Settings_Keys_String id, const char *val)
Sets a string settings value. The param is copied.