FreeRDP
All Data Structures Namespaces Files Functions Variables Typedefs Enumerations Enumerator Modules Pages
peer.c
1
23#include <freerdp/config.h>
24
25#include "settings.h"
26
27#include <winpr/assert.h>
28#include <winpr/cast.h>
29#include <winpr/crt.h>
30#include <winpr/winsock.h>
31
32#include "info.h"
33#include "display.h"
34
35#include <freerdp/log.h>
36#include <freerdp/streamdump.h>
37#include <freerdp/redirection.h>
38#include <freerdp/crypto/certificate.h>
39
40#include "rdp.h"
41#include "peer.h"
42#include "multitransport.h"
43
44#define TAG FREERDP_TAG("core.peer")
45
46static state_run_t peer_recv_pdu(freerdp_peer* client, wStream* s);
47
48static HANDLE freerdp_peer_virtual_channel_open(freerdp_peer* client, const char* name,
49 UINT32 flags)
50{
51 UINT32 index = 0;
52 BOOL joined = FALSE;
53 rdpMcsChannel* mcsChannel = NULL;
54 rdpPeerChannel* peerChannel = NULL;
55 rdpMcs* mcs = NULL;
56
57 WINPR_ASSERT(client);
58 WINPR_ASSERT(client->context);
59 WINPR_ASSERT(client->context->rdp);
60 WINPR_ASSERT(name);
61 mcs = client->context->rdp->mcs;
62 WINPR_ASSERT(mcs);
63
64 if (flags & WTS_CHANNEL_OPTION_DYNAMIC)
65 return NULL; /* not yet supported */
66
67 const size_t length = strnlen(name, 9);
68
69 if (length > 8)
70 return NULL; /* SVC maximum name length is 8 */
71
72 for (; index < mcs->channelCount; index++)
73 {
74 mcsChannel = &(mcs->channels[index]);
75
76 if (!mcsChannel->joined)
77 continue;
78
79 if (_strnicmp(name, mcsChannel->Name, length) == 0)
80 {
81 joined = TRUE;
82 break;
83 }
84 }
85
86 if (!joined)
87 return NULL; /* channel is not joined */
88
89 peerChannel = (rdpPeerChannel*)mcsChannel->handle;
90
91 if (peerChannel)
92 {
93 /* channel is already open */
94 return (HANDLE)peerChannel;
95 }
96
97 WINPR_ASSERT(index <= UINT16_MAX);
98 peerChannel =
99 server_channel_common_new(client, (UINT16)index, mcsChannel->ChannelId, 128, NULL, name);
100
101 if (peerChannel)
102 {
103 peerChannel->channelFlags = flags;
104 peerChannel->mcsChannel = mcsChannel;
105 mcsChannel->handle = (void*)peerChannel;
106 }
107
108 return (HANDLE)peerChannel;
109}
110
111static BOOL freerdp_peer_virtual_channel_close(WINPR_ATTR_UNUSED freerdp_peer* client,
112 HANDLE hChannel)
113{
114 rdpMcsChannel* mcsChannel = NULL;
115 rdpPeerChannel* peerChannel = NULL;
116
117 WINPR_ASSERT(client);
118
119 if (!hChannel)
120 return FALSE;
121
122 peerChannel = (rdpPeerChannel*)hChannel;
123 mcsChannel = peerChannel->mcsChannel;
124 WINPR_ASSERT(mcsChannel);
125 mcsChannel->handle = NULL;
126 server_channel_common_free(peerChannel);
127 return TRUE;
128}
129
130static int freerdp_peer_virtual_channel_write(freerdp_peer* client, HANDLE hChannel,
131 const BYTE* buffer, UINT32 length)
132{
133 wStream* s = NULL;
134 UINT32 flags = 0;
135 UINT32 chunkSize = 0;
136 UINT32 maxChunkSize = 0;
137 UINT32 totalLength = 0;
138 rdpPeerChannel* peerChannel = NULL;
139 rdpMcsChannel* mcsChannel = NULL;
140 rdpRdp* rdp = NULL;
141
142 WINPR_ASSERT(client);
143 WINPR_ASSERT(client->context);
144
145 rdp = client->context->rdp;
146 WINPR_ASSERT(rdp);
147 WINPR_ASSERT(rdp->settings);
148
149 if (!hChannel)
150 return -1;
151
152 peerChannel = (rdpPeerChannel*)hChannel;
153 mcsChannel = peerChannel->mcsChannel;
154 WINPR_ASSERT(peerChannel);
155 WINPR_ASSERT(mcsChannel);
156 if (peerChannel->channelFlags & WTS_CHANNEL_OPTION_DYNAMIC)
157 return -1; /* not yet supported */
158
159 maxChunkSize = rdp->settings->VCChunkSize;
160 totalLength = length;
161 flags = CHANNEL_FLAG_FIRST;
162
163 while (length > 0)
164 {
165 UINT16 sec_flags = 0;
166 s = rdp_send_stream_init(rdp, &sec_flags);
167
168 if (!s)
169 return -1;
170
171 if (length > maxChunkSize)
172 {
173 chunkSize = rdp->settings->VCChunkSize;
174 }
175 else
176 {
177 chunkSize = length;
178 flags |= CHANNEL_FLAG_LAST;
179 }
180
181 if (mcsChannel->options & CHANNEL_OPTION_SHOW_PROTOCOL)
182 flags |= CHANNEL_FLAG_SHOW_PROTOCOL;
183
184 Stream_Write_UINT32(s, totalLength);
185 Stream_Write_UINT32(s, flags);
186
187 if (!Stream_EnsureRemainingCapacity(s, chunkSize))
188 {
189 Stream_Release(s);
190 return -1;
191 }
192
193 Stream_Write(s, buffer, chunkSize);
194
195 WINPR_ASSERT(peerChannel->channelId <= UINT16_MAX);
196 if (!rdp_send(rdp, s, (UINT16)peerChannel->channelId, sec_flags))
197 return -1;
198
199 buffer += chunkSize;
200 length -= chunkSize;
201 flags = 0;
202 }
203
204 return 1;
205}
206
207static void* freerdp_peer_virtual_channel_get_data(WINPR_ATTR_UNUSED freerdp_peer* client,
208 HANDLE hChannel)
209{
210 rdpPeerChannel* peerChannel = (rdpPeerChannel*)hChannel;
211
212 WINPR_ASSERT(client);
213 if (!hChannel)
214 return NULL;
215
216 return peerChannel->extra;
217}
218
219static int freerdp_peer_virtual_channel_set_data(WINPR_ATTR_UNUSED freerdp_peer* client,
220 HANDLE hChannel, void* data)
221{
222 rdpPeerChannel* peerChannel = (rdpPeerChannel*)hChannel;
223
224 WINPR_ASSERT(client);
225 if (!hChannel)
226 return -1;
227
228 peerChannel->extra = data;
229 return 1;
230}
231
232static BOOL freerdp_peer_set_state(freerdp_peer* client, CONNECTION_STATE state)
233{
234 WINPR_ASSERT(client);
235 WINPR_ASSERT(client->context);
236 return rdp_server_transition_to_state(client->context->rdp, state);
237}
238
239static BOOL freerdp_peer_initialize(freerdp_peer* client)
240{
241 rdpRdp* rdp = NULL;
242 rdpSettings* settings = NULL;
243
244 WINPR_ASSERT(client);
245 WINPR_ASSERT(client->context);
246
247 rdp = client->context->rdp;
248 WINPR_ASSERT(rdp);
249
250 settings = rdp->settings;
251 WINPR_ASSERT(settings);
252
253 settings->ServerMode = TRUE;
254 settings->FrameAcknowledge = 0;
255 settings->LocalConnection = client->local;
256
257 const rdpCertificate* cert =
258 freerdp_settings_get_pointer(settings, FreeRDP_RdpServerCertificate);
259 if (!cert)
260 {
261 WLog_ERR(TAG, "Missing server certificate, can not continue.");
262 return FALSE;
263 }
264
265 if (freerdp_settings_get_bool(settings, FreeRDP_RdpSecurity))
266 {
267
268 if (!freerdp_certificate_is_rdp_security_compatible(cert))
269 {
270 if (!freerdp_settings_set_bool(settings, FreeRDP_RdpSecurity, FALSE))
271 return FALSE;
272 if (!freerdp_settings_set_bool(settings, FreeRDP_UseRdpSecurityLayer, FALSE))
273 return FALSE;
274 }
275 }
276
277 nego_set_RCG_supported(rdp->nego, settings->RemoteCredentialGuard);
278 if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_INITIAL))
279 return FALSE;
280
281 return TRUE;
282}
283
284#if defined(WITH_FREERDP_DEPRECATED)
285static BOOL freerdp_peer_get_fds(freerdp_peer* client, void** rfds, int* rcount)
286{
287 rdpTransport* transport = NULL;
288 WINPR_ASSERT(client);
289 WINPR_ASSERT(client->context);
290 WINPR_ASSERT(client->context->rdp);
291
292 transport = client->context->rdp->transport;
293 WINPR_ASSERT(transport);
294 transport_get_fds(transport, rfds, rcount);
295 return TRUE;
296}
297#endif
298
299static HANDLE freerdp_peer_get_event_handle(freerdp_peer* client)
300{
301 HANDLE hEvent = NULL;
302 rdpTransport* transport = NULL;
303 WINPR_ASSERT(client);
304 WINPR_ASSERT(client->context);
305 WINPR_ASSERT(client->context->rdp);
306
307 transport = client->context->rdp->transport;
308 hEvent = transport_get_front_bio(transport);
309 return hEvent;
310}
311
312static DWORD freerdp_peer_get_event_handles(freerdp_peer* client, HANDLE* events, DWORD count)
313{
314 WINPR_ASSERT(client);
315 WINPR_ASSERT(client->context);
316 WINPR_ASSERT(client->context->rdp);
317 return transport_get_event_handles(client->context->rdp->transport, events, count);
318}
319
320static BOOL freerdp_peer_check_fds(freerdp_peer* peer)
321{
322 int status = 0;
323 rdpRdp* rdp = NULL;
324
325 WINPR_ASSERT(peer);
326 WINPR_ASSERT(peer->context);
327
328 rdp = peer->context->rdp;
329 status = rdp_check_fds(rdp);
330
331 if (status < 0)
332 return FALSE;
333
334 return TRUE;
335}
336
337static state_run_t peer_recv_data_pdu(freerdp_peer* client, wStream* s,
338 WINPR_ATTR_UNUSED UINT16 totalLength)
339{
340 BYTE type = 0;
341 UINT16 length = 0;
342 UINT32 share_id = 0;
343 BYTE compressed_type = 0;
344 UINT16 compressed_len = 0;
345 rdpUpdate* update = NULL;
346
347 WINPR_ASSERT(s);
348 WINPR_ASSERT(client);
349 WINPR_ASSERT(client->context);
350 rdpRdp* rdp = client->context->rdp;
351 WINPR_ASSERT(rdp);
352 WINPR_ASSERT(rdp->mcs);
353
354 update = client->context->update;
355 WINPR_ASSERT(update);
356
357 if (!rdp_read_share_data_header(rdp, s, &length, &type, &share_id, &compressed_type,
358 &compressed_len))
359 return STATE_RUN_FAILED;
360
361#ifdef WITH_DEBUG_RDP
362 WLog_Print(rdp->log, WLOG_DEBUG, "recv %s Data PDU (0x%02" PRIX8 "), length: %" PRIu16 "",
363 data_pdu_type_to_string(type), type, length);
364#endif
365
366 switch (type)
367 {
368 case DATA_PDU_TYPE_SYNCHRONIZE:
369 if (!rdp_recv_client_synchronize_pdu(rdp, s))
370 return STATE_RUN_FAILED;
371
372 break;
373
374 case DATA_PDU_TYPE_CONTROL:
375 if (!rdp_server_accept_client_control_pdu(rdp, s))
376 return STATE_RUN_FAILED;
377
378 break;
379
380 case DATA_PDU_TYPE_INPUT:
381 if (!input_recv(rdp->input, s))
382 return STATE_RUN_FAILED;
383
384 break;
385
386 case DATA_PDU_TYPE_BITMAP_CACHE_PERSISTENT_LIST:
387 if (!rdp_server_accept_client_persistent_key_list_pdu(rdp, s))
388 return STATE_RUN_FAILED;
389 break;
390
391 case DATA_PDU_TYPE_FONT_LIST:
392 if (!rdp_server_accept_client_font_list_pdu(rdp, s))
393 return STATE_RUN_FAILED;
394
395 return STATE_RUN_CONTINUE; // State changed, trigger rerun
396
397 case DATA_PDU_TYPE_SHUTDOWN_REQUEST:
398 mcs_send_disconnect_provider_ultimatum(rdp->mcs,
399 Disconnect_Ultimatum_provider_initiated);
400 WLog_WARN(TAG, "disconnect provider ultimatum sent to peer, closing connection");
401 return STATE_RUN_QUIT_SESSION;
402
403 case DATA_PDU_TYPE_FRAME_ACKNOWLEDGE:
404 if (!Stream_CheckAndLogRequiredLength(TAG, s, 4))
405 return STATE_RUN_FAILED;
406
407 Stream_Read_UINT32(s, client->ack_frame_id);
408 IFCALL(update->SurfaceFrameAcknowledge, update->context, client->ack_frame_id);
409 break;
410
411 case DATA_PDU_TYPE_REFRESH_RECT:
412 if (!update_read_refresh_rect(update, s))
413 return STATE_RUN_FAILED;
414
415 break;
416
417 case DATA_PDU_TYPE_SUPPRESS_OUTPUT:
418 if (!update_read_suppress_output(update, s))
419 return STATE_RUN_FAILED;
420
421 break;
422
423 default:
424 WLog_ERR(TAG, "Data PDU type %" PRIu8 "", type);
425 break;
426 }
427
428 return STATE_RUN_SUCCESS;
429}
430
431static state_run_t peer_recv_tpkt_pdu(freerdp_peer* client, wStream* s)
432{
433 state_run_t rc = STATE_RUN_SUCCESS;
434 UINT16 length = 0;
435 UINT16 pduType = 0;
436 UINT16 pduSource = 0;
437 UINT16 channelId = 0;
438 UINT16 securityFlags = 0;
439
440 WINPR_ASSERT(s);
441 WINPR_ASSERT(client);
442 WINPR_ASSERT(client->context);
443
444 rdpRdp* rdp = client->context->rdp;
445 WINPR_ASSERT(rdp);
446 WINPR_ASSERT(rdp->mcs);
447
448 rdpSettings* settings = client->context->settings;
449 WINPR_ASSERT(settings);
450
451 if (!rdp_read_header(rdp, s, &length, &channelId))
452 return STATE_RUN_FAILED;
453
454 rdp->inPackets++;
455 if (freerdp_shall_disconnect_context(rdp->context))
456 return STATE_RUN_SUCCESS;
457
458 if (rdp_get_state(rdp) <= CONNECTION_STATE_LICENSING)
459 {
460 return rdp_handle_message_channel(rdp, s, channelId, length);
461 }
462
463 if (!rdp_handle_optional_rdp_decryption(rdp, s, &length, &securityFlags))
464 return STATE_RUN_FAILED;
465
466 if (channelId == MCS_GLOBAL_CHANNEL_ID)
467 {
468 char buffer[256] = { 0 };
469 UINT16 pduLength = 0;
470 UINT16 remain = 0;
471 if (!rdp_read_share_control_header(rdp, s, &pduLength, &remain, &pduType, &pduSource))
472 return STATE_RUN_FAILED;
473
474 settings->PduSource = pduSource;
475
476 WLog_DBG(TAG, "Received %s", pdu_type_to_str(pduType, buffer, sizeof(buffer)));
477 switch (pduType)
478 {
479 case PDU_TYPE_DATA:
480 rc = peer_recv_data_pdu(client, s, pduLength);
481 break;
482
483 case PDU_TYPE_CONFIRM_ACTIVE:
484 if (!rdp_server_accept_confirm_active(rdp, s, pduLength))
485 return STATE_RUN_FAILED;
486
487 break;
488
489 case PDU_TYPE_FLOW_RESPONSE:
490 case PDU_TYPE_FLOW_STOP:
491 case PDU_TYPE_FLOW_TEST:
492 if (!Stream_SafeSeek(s, remain))
493 {
494 WLog_WARN(TAG, "Short PDU, need %" PRIuz " bytes, got %" PRIuz, remain,
495 Stream_GetRemainingLength(s));
496 return STATE_RUN_FAILED;
497 }
498 break;
499
500 default:
501 WLog_ERR(TAG, "Client sent unknown pduType %" PRIu16 "", pduType);
502 return STATE_RUN_FAILED;
503 }
504 }
505 else if ((rdp->mcs->messageChannelId > 0) && (channelId == rdp->mcs->messageChannelId))
506 {
507 if (!settings->UseRdpSecurityLayer)
508 {
509 if (!rdp_read_security_header(rdp, s, &securityFlags, NULL))
510 return STATE_RUN_FAILED;
511 }
512
513 return rdp_recv_message_channel_pdu(rdp, s, securityFlags);
514 }
515 else
516 {
517 if (!freerdp_channel_peer_process(client, s, channelId))
518 return STATE_RUN_FAILED;
519 }
520 if (!tpkt_ensure_stream_consumed(rdp->log, s, length))
521 return STATE_RUN_FAILED;
522
523 return rc;
524}
525
526static state_run_t peer_recv_handle_auto_detect(freerdp_peer* client, wStream* s)
527{
528 state_run_t ret = STATE_RUN_FAILED;
529 rdpRdp* rdp = NULL;
530
531 WINPR_ASSERT(client);
532 WINPR_ASSERT(s);
533 WINPR_ASSERT(client->context);
534
535 rdp = client->context->rdp;
536 WINPR_ASSERT(rdp);
537
538 const rdpSettings* settings = client->context->settings;
539 WINPR_ASSERT(settings);
540
541 if (freerdp_settings_get_bool(settings, FreeRDP_NetworkAutoDetect))
542 {
543 switch (rdp_get_state(rdp))
544 {
545 case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_REQUEST:
546 autodetect_on_connect_time_auto_detect_begin(rdp->autodetect);
547 switch (autodetect_get_state(rdp->autodetect))
548 {
549 case FREERDP_AUTODETECT_STATE_REQUEST:
550 ret = STATE_RUN_SUCCESS;
551 if (!rdp_server_transition_to_state(
552 rdp, CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_RESPONSE))
553 return STATE_RUN_FAILED;
554 break;
555 case FREERDP_AUTODETECT_STATE_COMPLETE:
556 ret = STATE_RUN_CONTINUE; /* Rerun in next state */
557 if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_LICENSING))
558 return STATE_RUN_FAILED;
559 break;
560 default:
561 break;
562 }
563 break;
564 case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_RESPONSE:
565 ret = peer_recv_pdu(client, s);
566 if (state_run_success(ret))
567 {
568 autodetect_on_connect_time_auto_detect_progress(rdp->autodetect);
569 switch (autodetect_get_state(rdp->autodetect))
570 {
571 case FREERDP_AUTODETECT_STATE_REQUEST:
572 ret = STATE_RUN_SUCCESS;
573 break;
574 case FREERDP_AUTODETECT_STATE_COMPLETE:
575 ret = STATE_RUN_CONTINUE; /* Rerun in next state */
576 if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_LICENSING))
577 return STATE_RUN_FAILED;
578 break;
579 default:
580 break;
581 }
582 }
583 break;
584 default:
585 WINPR_ASSERT(FALSE);
586 break;
587 }
588 }
589 else
590 {
591 if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_LICENSING))
592 return STATE_RUN_FAILED;
593
594 ret = STATE_RUN_CONTINUE; /* Rerun in next state */
595 }
596
597 return ret;
598}
599
600static state_run_t peer_recv_handle_licensing(freerdp_peer* client, wStream* s)
601{
602 state_run_t ret = STATE_RUN_FAILED;
603 rdpRdp* rdp = NULL;
604 rdpSettings* settings = NULL;
605
606 WINPR_ASSERT(client);
607 WINPR_ASSERT(s);
608 WINPR_ASSERT(client->context);
609
610 rdp = client->context->rdp;
611 WINPR_ASSERT(rdp);
612
613 settings = rdp->settings;
614 WINPR_ASSERT(settings);
615
616 switch (license_get_state(rdp->license))
617 {
618 case LICENSE_STATE_INITIAL:
619 {
620 const BOOL required =
621 freerdp_settings_get_bool(settings, FreeRDP_ServerLicenseRequired);
622
623 if (required)
624 {
625 if (!license_server_configure(rdp->license))
626 ret = STATE_RUN_FAILED;
627 else if (!license_server_send_request(rdp->license))
628 ret = STATE_RUN_FAILED;
629 else
630 ret = STATE_RUN_SUCCESS;
631 }
632 else
633 {
634 if (license_send_valid_client_error_packet(rdp))
635 ret = STATE_RUN_CONTINUE; /* Rerun in next state, might be capabilities */
636 }
637 }
638 break;
639 case LICENSE_STATE_COMPLETED:
640 ret = STATE_RUN_CONTINUE; /* Licensing completed, continue in next state */
641 break;
642 case LICENSE_STATE_ABORTED:
643 ret = STATE_RUN_FAILED;
644 break;
645 default:
646 ret = peer_recv_pdu(client, s);
647 break;
648 }
649
650 return ret;
651}
652
653static state_run_t peer_recv_fastpath_pdu(freerdp_peer* client, wStream* s)
654{
655 rdpRdp* rdp = NULL;
656 UINT16 length = 0;
657 BOOL rc = 0;
658 rdpFastPath* fastpath = NULL;
659
660 WINPR_ASSERT(s);
661 WINPR_ASSERT(client);
662 WINPR_ASSERT(client->context);
663
664 rdp = client->context->rdp;
665 WINPR_ASSERT(rdp);
666
667 fastpath = rdp->fastpath;
668 WINPR_ASSERT(fastpath);
669
670 rc = fastpath_read_header_rdp(fastpath, s, &length);
671
672 if (!rc || (length == 0))
673 {
674 WLog_ERR(TAG, "incorrect FastPath PDU header length %" PRIu16 "", length);
675 return STATE_RUN_FAILED;
676 }
677 if (!Stream_CheckAndLogRequiredLength(TAG, s, length))
678 return STATE_RUN_FAILED;
679
680 if (!fastpath_decrypt(fastpath, s, &length))
681 return STATE_RUN_FAILED;
682
683 rdp->inPackets++;
684
685 return fastpath_recv_inputs(fastpath, s);
686}
687
688state_run_t peer_recv_pdu(freerdp_peer* client, wStream* s)
689{
690 int rc = tpkt_verify_header(s);
691
692 if (rc > 0)
693 return peer_recv_tpkt_pdu(client, s);
694 else if (rc == 0)
695 return peer_recv_fastpath_pdu(client, s);
696 else
697 return STATE_RUN_FAILED;
698}
699
700static state_run_t peer_unexpected_client_message(rdpRdp* rdp, UINT32 flag)
701{
702 char buffer[1024] = { 0 };
703 WLog_WARN(TAG, "Unexpected client message in state %s, missing flag %s",
704 rdp_get_state_string(rdp), rdp_finalize_flags_to_str(flag, buffer, sizeof(buffer)));
705 return STATE_RUN_SUCCESS; /* we ignore this as per spec input PDU are already allowed */
706}
707
708state_run_t rdp_peer_handle_state_demand_active(freerdp_peer* client)
709{
710 state_run_t ret = STATE_RUN_FAILED;
711
712 WINPR_ASSERT(client);
713 WINPR_ASSERT(client->context);
714
715 rdpRdp* rdp = client->context->rdp;
716 WINPR_ASSERT(rdp);
717
718 if (client->Capabilities && !client->Capabilities(client))
719 {
720 WLog_ERR(TAG, "[%s] freerdp_peer::Capabilities() callback failed",
721 rdp_get_state_string(rdp));
722 }
723 else if (!rdp_send_demand_active(rdp))
724 {
725 WLog_ERR(TAG, "[%s] rdp_send_demand_active() fail", rdp_get_state_string(rdp));
726 }
727 else
728 {
729 if (!rdp_server_transition_to_state(rdp,
730 CONNECTION_STATE_CAPABILITIES_EXCHANGE_MONITOR_LAYOUT))
731 return STATE_RUN_FAILED;
732 ret = STATE_RUN_CONTINUE;
733 }
734 return ret;
735}
736
743static state_run_t rdp_peer_handle_state_active(freerdp_peer* client)
744{
745 state_run_t ret = STATE_RUN_FAILED;
746
747 WINPR_ASSERT(client);
748 WINPR_ASSERT(client->context);
749
750 if (!client->connected)
751 {
756 IFCALLRET(client->PostConnect, client->connected, client);
757 }
758 if (!client->connected)
759 {
760 WLog_ERR(TAG, "PostConnect for peer %p failed", client);
761 ret = STATE_RUN_FAILED;
762 }
763 else if (!client->activated)
764 {
765 BOOL activated = TRUE;
766
767 /* Set client->activated TRUE before calling the Activate callback.
768 * the Activate callback might reset the client->activated flag even if it returns success
769 * (e.g. deactivate/reactivate sequence) */
770 client->activated = TRUE;
771 IFCALLRET(client->Activate, activated, client);
772
773 if (!activated)
774 {
775 WLog_ERR(TAG, "Activate for peer %p failed", client);
776 ret = STATE_RUN_FAILED;
777 }
778 else
779 ret = STATE_RUN_SUCCESS;
780 }
781 else
782 ret = STATE_RUN_ACTIVE;
783 return ret;
784}
785
786static state_run_t peer_recv_callback_internal(WINPR_ATTR_UNUSED rdpTransport* transport,
787 wStream* s, void* extra)
788{
789 UINT32 SelectedProtocol = 0;
790 freerdp_peer* client = (freerdp_peer*)extra;
791 rdpRdp* rdp = NULL;
792 state_run_t ret = STATE_RUN_FAILED;
793 rdpSettings* settings = NULL;
794
795 WINPR_ASSERT(transport);
796 WINPR_ASSERT(client);
797 WINPR_ASSERT(client->context);
798
799 rdp = client->context->rdp;
800 WINPR_ASSERT(rdp);
801
802 settings = client->context->settings;
803 WINPR_ASSERT(settings);
804
805 IFCALL(client->ReachedState, client, rdp_get_state(rdp));
806 switch (rdp_get_state(rdp))
807 {
808 case CONNECTION_STATE_INITIAL:
809 if (!freerdp_settings_enforce_consistency(settings))
810 ret = STATE_RUN_FAILED;
811 else if (rdp_server_transition_to_state(rdp, CONNECTION_STATE_NEGO))
812 ret = STATE_RUN_CONTINUE;
813 break;
814
815 case CONNECTION_STATE_NEGO:
816 if (!rdp_server_accept_nego(rdp, s))
817 {
818 WLog_ERR(TAG, "%s - rdp_server_accept_nego() fail", rdp_get_state_string(rdp));
819 }
820 else
821 {
822 SelectedProtocol = nego_get_selected_protocol(rdp->nego);
823 settings->RdstlsSecurity = (SelectedProtocol & PROTOCOL_RDSTLS) ? TRUE : FALSE;
824 settings->NlaSecurity = (SelectedProtocol & PROTOCOL_HYBRID) ? TRUE : FALSE;
825 settings->TlsSecurity = (SelectedProtocol & PROTOCOL_SSL) ? TRUE : FALSE;
826 settings->RdpSecurity = (SelectedProtocol == PROTOCOL_RDP) ? TRUE : FALSE;
827
828 if (SelectedProtocol & PROTOCOL_HYBRID)
829 {
831 (SEC_WINNT_AUTH_IDENTITY_INFO*)nego_get_identity(rdp->nego);
832 sspi_CopyAuthIdentity(&client->identity, identity);
833 IFCALLRET(client->Logon, client->authenticated, client, &client->identity,
834 TRUE);
835 nego_free_nla(rdp->nego);
836 }
837 else
838 {
839 IFCALLRET(client->Logon, client->authenticated, client, &client->identity,
840 FALSE);
841 }
842 if (rdp_server_transition_to_state(rdp, CONNECTION_STATE_MCS_CREATE_REQUEST))
843 ret = STATE_RUN_SUCCESS;
844 }
845 break;
846
847 case CONNECTION_STATE_NLA:
848 WINPR_ASSERT(FALSE); // TODO
849 break;
850
851 case CONNECTION_STATE_MCS_CREATE_REQUEST:
852 if (!rdp_server_accept_mcs_connect_initial(rdp, s))
853 {
854 WLog_ERR(TAG,
855 "%s - "
856 "rdp_server_accept_mcs_connect_initial() fail",
857 rdp_get_state_string(rdp));
858 }
859 else
860 ret = STATE_RUN_SUCCESS;
861
862 break;
863
864 case CONNECTION_STATE_MCS_ERECT_DOMAIN:
865 if (!rdp_server_accept_mcs_erect_domain_request(rdp, s))
866 {
867 WLog_ERR(TAG,
868 "%s - "
869 "rdp_server_accept_mcs_erect_domain_request() fail",
870 rdp_get_state_string(rdp));
871 }
872 else
873 ret = STATE_RUN_SUCCESS;
874
875 break;
876
877 case CONNECTION_STATE_MCS_ATTACH_USER:
878 if (!rdp_server_accept_mcs_attach_user_request(rdp, s))
879 {
880 WLog_ERR(TAG,
881 "%s - "
882 "rdp_server_accept_mcs_attach_user_request() fail",
883 rdp_get_state_string(rdp));
884 }
885 else
886 ret = STATE_RUN_SUCCESS;
887
888 break;
889
890 case CONNECTION_STATE_MCS_CHANNEL_JOIN_REQUEST:
891 if (!rdp_server_accept_mcs_channel_join_request(rdp, s))
892 {
893 WLog_ERR(TAG,
894 "%s - "
895 "rdp_server_accept_mcs_channel_join_request() fail",
896 rdp_get_state_string(rdp));
897 }
898 else
899 ret = STATE_RUN_SUCCESS;
900 break;
901
902 case CONNECTION_STATE_RDP_SECURITY_COMMENCEMENT:
903 ret = STATE_RUN_SUCCESS;
904
905 if (!rdp_server_establish_keys(rdp, s))
906 {
907 WLog_ERR(TAG,
908 "%s - "
909 "rdp_server_establish_keys() fail",
910 rdp_get_state_string(rdp));
911 ret = STATE_RUN_FAILED;
912 }
913
914 if (state_run_success(ret))
915 {
916 if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_SECURE_SETTINGS_EXCHANGE))
917 ret = STATE_RUN_FAILED;
918 else if (Stream_GetRemainingLength(s) > 0)
919 ret = STATE_RUN_CONTINUE; /* Rerun function */
920 }
921 break;
922
923 case CONNECTION_STATE_SECURE_SETTINGS_EXCHANGE:
924 if (rdp_recv_client_info(rdp, s))
925 {
926 if (rdp_server_transition_to_state(
927 rdp, CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_REQUEST))
928 ret = STATE_RUN_CONTINUE;
929 }
930 break;
931
932 case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_REQUEST:
933 case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_RESPONSE:
934 ret = peer_recv_handle_auto_detect(client, s);
935 break;
936
937 case CONNECTION_STATE_LICENSING:
938 ret = peer_recv_handle_licensing(client, s);
939 if (ret == STATE_RUN_CONTINUE)
940 {
941 if (!rdp_server_transition_to_state(
942 rdp, CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_REQUEST))
943 ret = STATE_RUN_FAILED;
944 }
945 break;
946
947 case CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_REQUEST:
948 if (settings->SupportMultitransport &&
949 ((settings->MultitransportFlags & INITIATE_REQUEST_PROTOCOL_UDPFECR) != 0))
950 {
951 /* only UDP reliable for now, nobody does lossy UDP (MS-RDPUDP only) these days */
952 ret = multitransport_server_request(rdp->multitransport,
953 INITIATE_REQUEST_PROTOCOL_UDPFECR);
954 switch (ret)
955 {
956 case STATE_RUN_SUCCESS:
957 rdp_server_transition_to_state(
958 rdp, CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_RESPONSE);
959 break;
960 case STATE_RUN_CONTINUE:
961 /* mismatch on the supported kind of UDP transports */
962 rdp_server_transition_to_state(
963 rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE);
964 break;
965 default:
966 break;
967 }
968 }
969 else
970 {
971 if (rdp_server_transition_to_state(
972 rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE))
973 ret = STATE_RUN_CONTINUE; /* Rerun, initialize next state */
974 }
975 break;
976 case CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_RESPONSE:
977 ret = peer_recv_pdu(client, s);
978 break;
979
980 case CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE:
981 ret = rdp_peer_handle_state_demand_active(client);
982 break;
983
984 case CONNECTION_STATE_CAPABILITIES_EXCHANGE_MONITOR_LAYOUT:
985 if (freerdp_settings_get_bool(settings, FreeRDP_SupportMonitorLayoutPdu))
986 {
987 MONITOR_DEF* monitors = NULL;
988
989 IFCALL(client->AdjustMonitorsLayout, client);
990
991 /* client supports the monitorLayout PDU, let's send him the monitors if any */
992 ret = STATE_RUN_SUCCESS;
993 if (freerdp_settings_get_uint32(settings, FreeRDP_MonitorCount) == 0)
994 {
995 const UINT32 w = freerdp_settings_get_uint32(settings, FreeRDP_DesktopWidth);
996 const UINT32 h = freerdp_settings_get_uint32(settings, FreeRDP_DesktopHeight);
997 const rdpMonitor primary = { .x = 0,
998 .y = 0,
999 .width = WINPR_ASSERTING_INT_CAST(int32_t, w),
1000 .height = WINPR_ASSERTING_INT_CAST(int32_t, h),
1001 .is_primary = TRUE,
1002 .orig_screen = 0,
1003 .attributes = { .physicalWidth = w,
1004 .physicalHeight = h,
1005 .orientation =
1006 ORIENTATION_LANDSCAPE,
1007 .desktopScaleFactor = 100,
1008 .deviceScaleFactor = 100 } };
1009 if (!freerdp_settings_set_pointer_array(settings, FreeRDP_MonitorDefArray, 0,
1010 &primary))
1011 ret = STATE_RUN_FAILED;
1012 else if (!freerdp_settings_set_uint32(settings, FreeRDP_MonitorCount, 1))
1013 ret = STATE_RUN_FAILED;
1014 }
1015 if (state_run_failed(ret))
1016 {
1017 }
1018 else if (!display_convert_rdp_monitor_to_monitor_def(
1019 settings->MonitorCount, settings->MonitorDefArray, &monitors))
1020 {
1021 ret = STATE_RUN_FAILED;
1022 }
1023 else if (!freerdp_display_send_monitor_layout(rdp->context, settings->MonitorCount,
1024 monitors))
1025 {
1026 ret = STATE_RUN_FAILED;
1027 }
1028 else
1029 ret = STATE_RUN_SUCCESS;
1030 free(monitors);
1031
1032 const size_t len = Stream_GetRemainingLength(s);
1033 if (!state_run_failed(ret) && (len > 0))
1034 ret = STATE_RUN_CONTINUE;
1035 }
1036 else
1037 {
1038 const size_t len = Stream_GetRemainingLength(s);
1039 if (len > 0)
1040 ret = STATE_RUN_CONTINUE;
1041 else
1042 ret = STATE_RUN_SUCCESS;
1043 }
1044 if (state_run_success(ret))
1045 {
1046 if (!rdp_server_transition_to_state(
1047 rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE_CONFIRM_ACTIVE))
1048 ret = STATE_RUN_FAILED;
1049 }
1050 break;
1051
1052 case CONNECTION_STATE_CAPABILITIES_EXCHANGE_CONFIRM_ACTIVE:
1057 ret = peer_recv_pdu(client, s);
1058 break;
1059
1060 case CONNECTION_STATE_FINALIZATION_SYNC:
1061 ret = peer_recv_pdu(client, s);
1062 if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_SYNCHRONIZE_PDU))
1063 {
1064 if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_FINALIZATION_COOPERATE))
1065 ret = STATE_RUN_FAILED;
1066 }
1067 else
1068 ret = peer_unexpected_client_message(rdp, FINALIZE_CS_SYNCHRONIZE_PDU);
1069 break;
1070 case CONNECTION_STATE_FINALIZATION_COOPERATE:
1071 ret = peer_recv_pdu(client, s);
1072 if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_CONTROL_COOPERATE_PDU))
1073 {
1074 if (!rdp_server_transition_to_state(rdp,
1075 CONNECTION_STATE_FINALIZATION_REQUEST_CONTROL))
1076 ret = STATE_RUN_FAILED;
1077 }
1078 else
1079 ret = peer_unexpected_client_message(rdp, FINALIZE_CS_CONTROL_COOPERATE_PDU);
1080 break;
1081 case CONNECTION_STATE_FINALIZATION_REQUEST_CONTROL:
1082 ret = peer_recv_pdu(client, s);
1083 if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_CONTROL_REQUEST_PDU))
1084 {
1085 if (!rdp_send_server_control_granted_pdu(rdp))
1086 ret = STATE_RUN_FAILED;
1087 else if (!rdp_server_transition_to_state(
1088 rdp, CONNECTION_STATE_FINALIZATION_PERSISTENT_KEY_LIST))
1089 ret = STATE_RUN_FAILED;
1090 }
1091 else
1092 ret = peer_unexpected_client_message(rdp, FINALIZE_CS_CONTROL_REQUEST_PDU);
1093 break;
1094 case CONNECTION_STATE_FINALIZATION_PERSISTENT_KEY_LIST:
1095 if (freerdp_settings_get_bool(settings, FreeRDP_BitmapCachePersistEnabled) &&
1096 !rdp_finalize_is_flag_set(rdp, FINALIZE_DEACTIVATE_REACTIVATE))
1097 {
1098 ret = peer_recv_pdu(client, s);
1099
1100 if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_PERSISTENT_KEY_LIST_PDU))
1101 {
1102 if (!rdp_server_transition_to_state(rdp,
1103 CONNECTION_STATE_FINALIZATION_FONT_LIST))
1104 ret = STATE_RUN_FAILED;
1105 }
1106 else
1107 ret = peer_unexpected_client_message(rdp,
1108 CONNECTION_STATE_FINALIZATION_FONT_LIST);
1109 }
1110 else
1111 {
1112 if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_FINALIZATION_FONT_LIST))
1113 ret = STATE_RUN_FAILED;
1114 else
1115 ret = STATE_RUN_CONTINUE;
1116 }
1117 break;
1118 case CONNECTION_STATE_FINALIZATION_FONT_LIST:
1119 ret = peer_recv_pdu(client, s);
1120 if (state_run_success(ret))
1121 {
1122 if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_FONT_LIST_PDU))
1123 {
1124 if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_ACTIVE))
1125 ret = STATE_RUN_FAILED;
1126 else
1127 {
1128 update_reset_state(rdp->update);
1129 ret = STATE_RUN_CONTINUE;
1130 }
1131 }
1132 else
1133 ret = peer_unexpected_client_message(rdp, FINALIZE_CS_FONT_LIST_PDU);
1134 }
1135 break;
1136
1137 case CONNECTION_STATE_ACTIVE:
1138 ret = rdp_peer_handle_state_active(client);
1139 if (ret >= STATE_RUN_ACTIVE)
1140 ret = peer_recv_pdu(client, s);
1141 break;
1142
1143 /* States that must not happen in server state machine */
1144 case CONNECTION_STATE_FINALIZATION_CLIENT_SYNC:
1145 case CONNECTION_STATE_FINALIZATION_CLIENT_COOPERATE:
1146 case CONNECTION_STATE_FINALIZATION_CLIENT_GRANTED_CONTROL:
1147 case CONNECTION_STATE_FINALIZATION_CLIENT_FONT_MAP:
1148 default:
1149 WLog_ERR(TAG, "%s state %d", rdp_get_state_string(rdp), rdp_get_state(rdp));
1150 break;
1151 }
1152
1153 return ret;
1154}
1155
1156static state_run_t peer_recv_callback(rdpTransport* transport, wStream* s, void* extra)
1157{
1158 char buffer[64] = { 0 };
1159 state_run_t rc = STATE_RUN_FAILED;
1160 const size_t start = Stream_GetPosition(s);
1161 const rdpContext* context = transport_get_context(transport);
1162 DWORD level = WLOG_TRACE;
1163 static wLog* log = NULL;
1164 if (!log)
1165 log = WLog_Get(TAG);
1166
1167 WINPR_ASSERT(context);
1168 do
1169 {
1170 const rdpRdp* rdp = context->rdp;
1171 const char* old = rdp_get_state_string(rdp);
1172
1173 if (rc == STATE_RUN_TRY_AGAIN)
1174 Stream_SetPosition(s, start);
1175 rc = peer_recv_callback_internal(transport, s, extra);
1176
1177 const size_t len = Stream_GetRemainingLength(s);
1178 if ((len > 0) && !state_run_continue(rc))
1179 level = WLOG_WARN;
1180 WLog_Print(log, level,
1181 "(server)[%s -> %s] current return %s [%" PRIuz " bytes not processed]", old,
1182 rdp_get_state_string(rdp), state_run_result_string(rc, buffer, sizeof(buffer)),
1183 len);
1184 } while (state_run_continue(rc));
1185
1186 return rc;
1187}
1188
1189static BOOL freerdp_peer_close(freerdp_peer* client)
1190{
1191 UINT32 SelectedProtocol = 0;
1192 rdpContext* context = NULL;
1193
1194 WINPR_ASSERT(client);
1195
1196 context = client->context;
1197 WINPR_ASSERT(context);
1198 WINPR_ASSERT(context->settings);
1199 WINPR_ASSERT(context->rdp);
1200
1204 SelectedProtocol = nego_get_selected_protocol(context->rdp->nego);
1205
1206 if (SelectedProtocol & PROTOCOL_FAILED_NEGO)
1207 return TRUE;
1208
1214 if (!rdp_send_deactivate_all(context->rdp))
1215 return FALSE;
1216
1217 if (freerdp_settings_get_bool(context->settings, FreeRDP_SupportErrorInfoPdu))
1218 {
1219 rdp_send_error_info(context->rdp);
1220 }
1221
1222 return mcs_send_disconnect_provider_ultimatum(context->rdp->mcs,
1223 Disconnect_Ultimatum_provider_initiated);
1224}
1225
1226static void freerdp_peer_disconnect(freerdp_peer* client)
1227{
1228 rdpTransport* transport = NULL;
1229 WINPR_ASSERT(client);
1230
1231 transport = freerdp_get_transport(client->context);
1232 transport_disconnect(transport);
1233}
1234
1235static BOOL freerdp_peer_send_channel_data(freerdp_peer* client, UINT16 channelId, const BYTE* data,
1236 size_t size)
1237{
1238 WINPR_ASSERT(client);
1239 WINPR_ASSERT(client->context);
1240 WINPR_ASSERT(client->context->rdp);
1241 return rdp_send_channel_data(client->context->rdp, channelId, data, size);
1242}
1243
1244static BOOL freerdp_peer_send_server_redirection_pdu(freerdp_peer* peer,
1245 const rdpRedirection* redirection)
1246{
1247 BOOL rc = FALSE;
1248 WINPR_ASSERT(peer);
1249 WINPR_ASSERT(peer->context);
1250
1251 UINT16 sec_flags = 0;
1252 wStream* s = rdp_send_stream_pdu_init(peer->context->rdp, &sec_flags);
1253 if (!s)
1254 return FALSE;
1255 if (!rdp_write_enhanced_security_redirection_packet(s, redirection))
1256 goto fail;
1257 if (!rdp_send_pdu(peer->context->rdp, s, PDU_TYPE_SERVER_REDIRECTION, 0, sec_flags))
1258 goto fail;
1259 rc = rdp_reset_runtime_settings(peer->context->rdp);
1260fail:
1261 Stream_Release(s);
1262 return rc;
1263}
1264
1265static BOOL freerdp_peer_send_channel_packet(freerdp_peer* client, UINT16 channelId,
1266 size_t totalSize, UINT32 flags, const BYTE* data,
1267 size_t chunkSize)
1268{
1269 WINPR_ASSERT(client);
1270 WINPR_ASSERT(client->context);
1271 WINPR_ASSERT(client->context->rdp);
1272 return rdp_channel_send_packet(client->context->rdp, channelId, totalSize, flags, data,
1273 chunkSize);
1274}
1275
1276static BOOL freerdp_peer_is_write_blocked(freerdp_peer* peer)
1277{
1278 rdpTransport* transport = NULL;
1279 WINPR_ASSERT(peer);
1280 WINPR_ASSERT(peer->context);
1281 WINPR_ASSERT(peer->context->rdp);
1282 WINPR_ASSERT(peer->context->rdp->transport);
1283 transport = peer->context->rdp->transport;
1284 return transport_is_write_blocked(transport);
1285}
1286
1287static int freerdp_peer_drain_output_buffer(freerdp_peer* peer)
1288{
1289 rdpTransport* transport = NULL;
1290 WINPR_ASSERT(peer);
1291 WINPR_ASSERT(peer->context);
1292 WINPR_ASSERT(peer->context->rdp);
1293 WINPR_ASSERT(peer->context->rdp->transport);
1294 transport = peer->context->rdp->transport;
1295 return transport_drain_output_buffer(transport);
1296}
1297
1298static BOOL freerdp_peer_has_more_to_read(freerdp_peer* peer)
1299{
1300 WINPR_ASSERT(peer);
1301 WINPR_ASSERT(peer->context);
1302 WINPR_ASSERT(peer->context->rdp);
1303 return transport_have_more_bytes_to_read(peer->context->rdp->transport);
1304}
1305
1306static LicenseCallbackResult freerdp_peer_nolicense(freerdp_peer* peer,
1307 WINPR_ATTR_UNUSED wStream* s)
1308{
1309 rdpRdp* rdp = NULL;
1310
1311 WINPR_ASSERT(peer);
1312 WINPR_ASSERT(peer->context);
1313
1314 rdp = peer->context->rdp;
1315
1316 if (!license_send_valid_client_error_packet(rdp))
1317 {
1318 WLog_ERR(TAG, "freerdp_peer_nolicense: license_send_valid_client_error_packet() failed");
1319 return LICENSE_CB_ABORT;
1320 }
1321
1322 return LICENSE_CB_COMPLETED;
1323}
1324
1325BOOL freerdp_peer_context_new(freerdp_peer* client)
1326{
1327 return freerdp_peer_context_new_ex(client, NULL);
1328}
1329
1330void freerdp_peer_context_free(freerdp_peer* client)
1331{
1332 if (!client)
1333 return;
1334
1335 IFCALL(client->ContextFree, client, client->context);
1336
1337 if (client->context)
1338 {
1339 rdpContext* ctx = client->context;
1340
1341 (void)CloseHandle(ctx->channelErrorEvent);
1342 ctx->channelErrorEvent = NULL;
1343 free(ctx->errorDescription);
1344 ctx->errorDescription = NULL;
1345 rdp_free(ctx->rdp);
1346 ctx->rdp = NULL;
1347 metrics_free(ctx->metrics);
1348 ctx->metrics = NULL;
1349 stream_dump_free(ctx->dump);
1350 ctx->dump = NULL;
1351 free(ctx);
1352 }
1353 client->context = NULL;
1354}
1355
1356static const char* os_major_type_to_string(UINT16 osMajorType)
1357{
1358 switch (osMajorType)
1359 {
1360 case OSMAJORTYPE_UNSPECIFIED:
1361 return "Unspecified platform";
1362 case OSMAJORTYPE_WINDOWS:
1363 return "Windows platform";
1364 case OSMAJORTYPE_OS2:
1365 return "OS/2 platform";
1366 case OSMAJORTYPE_MACINTOSH:
1367 return "Macintosh platform";
1368 case OSMAJORTYPE_UNIX:
1369 return "UNIX platform";
1370 case OSMAJORTYPE_IOS:
1371 return "iOS platform";
1372 case OSMAJORTYPE_OSX:
1373 return "OS X platform";
1374 case OSMAJORTYPE_ANDROID:
1375 return "Android platform";
1376 case OSMAJORTYPE_CHROME_OS:
1377 return "Chrome OS platform";
1378 default:
1379 break;
1380 }
1381
1382 return "Unknown platform";
1383}
1384
1385const char* freerdp_peer_os_major_type_string(freerdp_peer* client)
1386{
1387 WINPR_ASSERT(client);
1388
1389 rdpContext* context = client->context;
1390 WINPR_ASSERT(context);
1391 WINPR_ASSERT(context->settings);
1392
1393 const UINT32 osMajorType = freerdp_settings_get_uint32(context->settings, FreeRDP_OsMajorType);
1394 WINPR_ASSERT(osMajorType <= UINT16_MAX);
1395 return os_major_type_to_string((UINT16)osMajorType);
1396}
1397
1398static const char* os_minor_type_to_string(UINT16 osMinorType)
1399{
1400 switch (osMinorType)
1401 {
1402 case OSMINORTYPE_UNSPECIFIED:
1403 return "Unspecified version";
1404 case OSMINORTYPE_WINDOWS_31X:
1405 return "Windows 3.1x";
1406 case OSMINORTYPE_WINDOWS_95:
1407 return "Windows 95";
1408 case OSMINORTYPE_WINDOWS_NT:
1409 return "Windows NT";
1410 case OSMINORTYPE_OS2_V21:
1411 return "OS/2 2.1";
1412 case OSMINORTYPE_POWER_PC:
1413 return "PowerPC";
1414 case OSMINORTYPE_MACINTOSH:
1415 return "Macintosh";
1416 case OSMINORTYPE_NATIVE_XSERVER:
1417 return "Native X Server";
1418 case OSMINORTYPE_PSEUDO_XSERVER:
1419 return "Pseudo X Server";
1420 case OSMINORTYPE_WINDOWS_RT:
1421 return "Windows RT";
1422 default:
1423 break;
1424 }
1425
1426 return "Unknown version";
1427}
1428
1429const char* freerdp_peer_os_minor_type_string(freerdp_peer* client)
1430{
1431 WINPR_ASSERT(client);
1432
1433 rdpContext* context = client->context;
1434 WINPR_ASSERT(context);
1435 WINPR_ASSERT(context->settings);
1436
1437 const UINT32 osMinorType = freerdp_settings_get_uint32(context->settings, FreeRDP_OsMinorType);
1438 WINPR_ASSERT(osMinorType <= UINT16_MAX);
1439 return os_minor_type_to_string((UINT16)osMinorType);
1440}
1441
1442freerdp_peer* freerdp_peer_new(int sockfd)
1443{
1444 UINT32 option_value = 0;
1445 socklen_t option_len = 0;
1446 freerdp_peer* client = (freerdp_peer*)calloc(1, sizeof(freerdp_peer));
1447
1448 if (!client)
1449 return NULL;
1450
1451 option_value = TRUE;
1452 option_len = sizeof(option_value);
1453
1454 if (sockfd >= 0)
1455 {
1456 if (setsockopt(sockfd, IPPROTO_TCP, TCP_NODELAY, (void*)&option_value, option_len) < 0)
1457 {
1458 /* local unix sockets don't have the TCP_NODELAY implemented, so don't make this
1459 * error fatal */
1460 WLog_DBG(TAG, "can't set TCP_NODELAY, continuing anyway");
1461 }
1462 }
1463
1464 if (client)
1465 {
1466 client->sockfd = sockfd;
1467 client->ContextSize = sizeof(rdpContext);
1468 client->Initialize = freerdp_peer_initialize;
1469#if defined(WITH_FREERDP_DEPRECATED)
1470 client->GetFileDescriptor = freerdp_peer_get_fds;
1471#endif
1472 client->GetEventHandle = freerdp_peer_get_event_handle;
1473 client->GetEventHandles = freerdp_peer_get_event_handles;
1474 client->CheckFileDescriptor = freerdp_peer_check_fds;
1475 client->Close = freerdp_peer_close;
1476 client->Disconnect = freerdp_peer_disconnect;
1477 client->SendChannelData = freerdp_peer_send_channel_data;
1478 client->SendChannelPacket = freerdp_peer_send_channel_packet;
1479 client->SendServerRedirection = freerdp_peer_send_server_redirection_pdu;
1480 client->IsWriteBlocked = freerdp_peer_is_write_blocked;
1481 client->DrainOutputBuffer = freerdp_peer_drain_output_buffer;
1482 client->HasMoreToRead = freerdp_peer_has_more_to_read;
1483 client->VirtualChannelOpen = freerdp_peer_virtual_channel_open;
1484 client->VirtualChannelClose = freerdp_peer_virtual_channel_close;
1485 client->VirtualChannelWrite = freerdp_peer_virtual_channel_write;
1486 client->VirtualChannelRead = NULL; /* must be defined by server application */
1487 client->VirtualChannelGetData = freerdp_peer_virtual_channel_get_data;
1488 client->VirtualChannelSetData = freerdp_peer_virtual_channel_set_data;
1489 client->SetState = freerdp_peer_set_state;
1490 }
1491
1492 return client;
1493}
1494
1495void freerdp_peer_free(freerdp_peer* client)
1496{
1497 if (!client)
1498 return;
1499
1500 sspi_FreeAuthIdentity(&client->identity);
1501 if (client->sockfd >= 0)
1502 closesocket((SOCKET)client->sockfd);
1503 free(client);
1504}
1505
1506static BOOL freerdp_peer_transport_setup(freerdp_peer* client)
1507{
1508 rdpRdp* rdp = NULL;
1509
1510 WINPR_ASSERT(client);
1511 WINPR_ASSERT(client->context);
1512
1513 rdp = client->context->rdp;
1514 WINPR_ASSERT(rdp);
1515
1516 if (!transport_attach(rdp->transport, client->sockfd))
1517 return FALSE;
1518 client->sockfd = -1;
1519
1520 if (!transport_set_recv_callbacks(rdp->transport, peer_recv_callback, client))
1521 return FALSE;
1522
1523 if (!transport_set_blocking_mode(rdp->transport, FALSE))
1524 return FALSE;
1525
1526 return TRUE;
1527}
1528
1529BOOL freerdp_peer_context_new_ex(freerdp_peer* client, const rdpSettings* settings)
1530{
1531 rdpRdp* rdp = NULL;
1532 rdpContext* context = NULL;
1533 BOOL ret = TRUE;
1534
1535 if (!client)
1536 return FALSE;
1537
1538 WINPR_ASSERT(client->ContextSize >= sizeof(rdpContext));
1539 if (!(context = (rdpContext*)calloc(1, client->ContextSize)))
1540 goto fail;
1541
1542 client->context = context;
1543 context->peer = client;
1544 context->ServerMode = TRUE;
1545 context->log = WLog_Get(TAG);
1546 if (!context->log)
1547 goto fail;
1548
1549 if (settings)
1550 {
1551 context->settings = freerdp_settings_clone(settings);
1552 if (!context->settings)
1553 goto fail;
1554 }
1555
1556 context->dump = stream_dump_new();
1557 if (!context->dump)
1558 goto fail;
1559 if (!(context->metrics = metrics_new(context)))
1560 goto fail;
1561
1562 if (!(rdp = rdp_new(context)))
1563 goto fail;
1564
1565 rdp_log_build_warnings(rdp);
1566
1567#if defined(WITH_FREERDP_DEPRECATED)
1568 client->update = rdp->update;
1569 client->settings = rdp->settings;
1570 client->autodetect = rdp->autodetect;
1571#endif
1572 context->rdp = rdp;
1573 context->input = rdp->input;
1574 context->update = rdp->update;
1575 context->settings = rdp->settings;
1576 context->autodetect = rdp->autodetect;
1577 update_register_server_callbacks(rdp->update);
1578 autodetect_register_server_callbacks(rdp->autodetect);
1579
1580 if (!(context->channelErrorEvent = CreateEvent(NULL, TRUE, FALSE, NULL)))
1581 {
1582 WLog_ERR(TAG, "CreateEvent failed!");
1583 goto fail;
1584 }
1585
1586 if (!(context->errorDescription = calloc(1, 500)))
1587 {
1588 WLog_ERR(TAG, "calloc failed!");
1589 goto fail;
1590 }
1591
1592 if (!freerdp_peer_transport_setup(client))
1593 goto fail;
1594
1595 client->IsWriteBlocked = freerdp_peer_is_write_blocked;
1596 client->DrainOutputBuffer = freerdp_peer_drain_output_buffer;
1597 client->HasMoreToRead = freerdp_peer_has_more_to_read;
1598 client->LicenseCallback = freerdp_peer_nolicense;
1599 IFCALLRET(client->ContextNew, ret, client, client->context);
1600
1601 if (!ret)
1602 goto fail;
1603 return TRUE;
1604
1605fail:
1606 WLog_ERR(TAG, "ContextNew callback failed");
1607 freerdp_peer_context_free(client);
1608 return FALSE;
1609}
FREERDP_API UINT32 freerdp_settings_get_uint32(const rdpSettings *settings, FreeRDP_Settings_Keys_UInt32 id)
Returns a UINT32 settings value.
FREERDP_API BOOL freerdp_settings_get_bool(const rdpSettings *settings, FreeRDP_Settings_Keys_Bool id)
Returns a boolean settings value.
FREERDP_API rdpSettings * freerdp_settings_clone(const rdpSettings *settings)
Creates a deep copy of settings.
FREERDP_API const void * freerdp_settings_get_pointer(const rdpSettings *settings, FreeRDP_Settings_Keys_Pointer id)
Returns a immutable pointer settings value.
FREERDP_API BOOL freerdp_settings_set_uint32(rdpSettings *settings, FreeRDP_Settings_Keys_UInt32 id, UINT32 param)
Sets a UINT32 settings value.
FREERDP_API BOOL freerdp_settings_set_bool(rdpSettings *settings, FreeRDP_Settings_Keys_Bool id, BOOL param)
Sets a BOOL settings value.