23#include <freerdp/config.h>
27#include <winpr/assert.h>
28#include <winpr/cast.h>
30#include <winpr/winsock.h>
35#include <freerdp/log.h>
36#include <freerdp/streamdump.h>
37#include <freerdp/redirection.h>
38#include <freerdp/crypto/certificate.h>
42#include "multitransport.h"
44#define TAG FREERDP_TAG("core.peer")
46static state_run_t peer_recv_pdu(freerdp_peer* client,
wStream* s);
48static HANDLE freerdp_peer_virtual_channel_open(freerdp_peer* client,
const char* name,
53 rdpMcsChannel* mcsChannel = NULL;
54 rdpPeerChannel* peerChannel = NULL;
58 WINPR_ASSERT(client->context);
59 WINPR_ASSERT(client->context->rdp);
61 mcs = client->context->rdp->mcs;
64 if (flags & WTS_CHANNEL_OPTION_DYNAMIC)
67 const size_t length = strnlen(name, 9);
72 for (; index < mcs->channelCount; index++)
74 mcsChannel = &(mcs->channels[index]);
76 if (!mcsChannel->joined)
79 if (_strnicmp(name, mcsChannel->Name, length) == 0)
89 peerChannel = (rdpPeerChannel*)mcsChannel->handle;
94 return (HANDLE)peerChannel;
97 WINPR_ASSERT(index <= UINT16_MAX);
99 server_channel_common_new(client, (UINT16)index, mcsChannel->ChannelId, 128, NULL, name);
103 peerChannel->channelFlags = flags;
104 peerChannel->mcsChannel = mcsChannel;
105 mcsChannel->handle = (
void*)peerChannel;
108 return (HANDLE)peerChannel;
111static BOOL freerdp_peer_virtual_channel_close(WINPR_ATTR_UNUSED freerdp_peer* client,
114 rdpMcsChannel* mcsChannel = NULL;
115 rdpPeerChannel* peerChannel = NULL;
117 WINPR_ASSERT(client);
122 peerChannel = (rdpPeerChannel*)hChannel;
123 mcsChannel = peerChannel->mcsChannel;
124 WINPR_ASSERT(mcsChannel);
125 mcsChannel->handle = NULL;
126 server_channel_common_free(peerChannel);
130static int freerdp_peer_virtual_channel_write(freerdp_peer* client, HANDLE hChannel,
131 const BYTE* buffer, UINT32 length)
135 UINT32 chunkSize = 0;
136 UINT32 maxChunkSize = 0;
137 UINT32 totalLength = 0;
138 rdpPeerChannel* peerChannel = NULL;
139 rdpMcsChannel* mcsChannel = NULL;
142 WINPR_ASSERT(client);
143 WINPR_ASSERT(client->context);
145 rdp = client->context->rdp;
147 WINPR_ASSERT(rdp->settings);
152 peerChannel = (rdpPeerChannel*)hChannel;
153 mcsChannel = peerChannel->mcsChannel;
154 WINPR_ASSERT(peerChannel);
155 WINPR_ASSERT(mcsChannel);
156 if (peerChannel->channelFlags & WTS_CHANNEL_OPTION_DYNAMIC)
159 maxChunkSize = rdp->settings->VCChunkSize;
160 totalLength = length;
161 flags = CHANNEL_FLAG_FIRST;
165 UINT16 sec_flags = 0;
166 s = rdp_send_stream_init(rdp, &sec_flags);
171 if (length > maxChunkSize)
173 chunkSize = rdp->settings->VCChunkSize;
178 flags |= CHANNEL_FLAG_LAST;
181 if (mcsChannel->options & CHANNEL_OPTION_SHOW_PROTOCOL)
182 flags |= CHANNEL_FLAG_SHOW_PROTOCOL;
184 Stream_Write_UINT32(s, totalLength);
185 Stream_Write_UINT32(s, flags);
187 if (!Stream_EnsureRemainingCapacity(s, chunkSize))
193 Stream_Write(s, buffer, chunkSize);
195 WINPR_ASSERT(peerChannel->channelId <= UINT16_MAX);
196 if (!rdp_send(rdp, s, (UINT16)peerChannel->channelId, sec_flags))
207static void* freerdp_peer_virtual_channel_get_data(WINPR_ATTR_UNUSED freerdp_peer* client,
210 rdpPeerChannel* peerChannel = (rdpPeerChannel*)hChannel;
212 WINPR_ASSERT(client);
216 return peerChannel->extra;
219static int freerdp_peer_virtual_channel_set_data(WINPR_ATTR_UNUSED freerdp_peer* client,
220 HANDLE hChannel,
void* data)
222 rdpPeerChannel* peerChannel = (rdpPeerChannel*)hChannel;
224 WINPR_ASSERT(client);
228 peerChannel->extra = data;
232static BOOL freerdp_peer_set_state(freerdp_peer* client, CONNECTION_STATE state)
234 WINPR_ASSERT(client);
235 WINPR_ASSERT(client->context);
236 return rdp_server_transition_to_state(client->context->rdp, state);
239static BOOL freerdp_peer_initialize(freerdp_peer* client)
242 rdpSettings* settings = NULL;
244 WINPR_ASSERT(client);
245 WINPR_ASSERT(client->context);
247 rdp = client->context->rdp;
250 settings = rdp->settings;
251 WINPR_ASSERT(settings);
253 settings->ServerMode = TRUE;
254 settings->FrameAcknowledge = 0;
255 settings->LocalConnection = client->local;
257 const rdpCertificate* cert =
261 WLog_ERR(TAG,
"Missing server certificate, can not continue.");
268 if (!freerdp_certificate_is_rdp_security_compatible(cert))
277 nego_set_RCG_supported(rdp->nego, settings->RemoteCredentialGuard);
278 if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_INITIAL))
284#if defined(WITH_FREERDP_DEPRECATED)
285static BOOL freerdp_peer_get_fds(freerdp_peer* client,
void** rfds,
int* rcount)
287 rdpTransport* transport = NULL;
288 WINPR_ASSERT(client);
289 WINPR_ASSERT(client->context);
290 WINPR_ASSERT(client->context->rdp);
292 transport = client->context->rdp->transport;
293 WINPR_ASSERT(transport);
294 transport_get_fds(transport, rfds, rcount);
299static HANDLE freerdp_peer_get_event_handle(freerdp_peer* client)
301 HANDLE hEvent = NULL;
302 rdpTransport* transport = NULL;
303 WINPR_ASSERT(client);
304 WINPR_ASSERT(client->context);
305 WINPR_ASSERT(client->context->rdp);
307 transport = client->context->rdp->transport;
308 hEvent = transport_get_front_bio(transport);
312static DWORD freerdp_peer_get_event_handles(freerdp_peer* client, HANDLE* events, DWORD count)
314 WINPR_ASSERT(client);
315 WINPR_ASSERT(client->context);
316 WINPR_ASSERT(client->context->rdp);
317 return transport_get_event_handles(client->context->rdp->transport, events, count);
320static BOOL freerdp_peer_check_fds(freerdp_peer* peer)
326 WINPR_ASSERT(peer->context);
328 rdp = peer->context->rdp;
329 status = rdp_check_fds(rdp);
337static state_run_t peer_recv_data_pdu(freerdp_peer* client,
wStream* s,
338 WINPR_ATTR_UNUSED UINT16 totalLength)
343 BYTE compressed_type = 0;
344 UINT16 compressed_len = 0;
345 rdpUpdate* update = NULL;
348 WINPR_ASSERT(client);
349 WINPR_ASSERT(client->context);
350 rdpRdp* rdp = client->context->rdp;
352 WINPR_ASSERT(rdp->mcs);
354 update = client->context->update;
355 WINPR_ASSERT(update);
357 if (!rdp_read_share_data_header(rdp, s, &length, &type, &share_id, &compressed_type,
359 return STATE_RUN_FAILED;
362 WLog_Print(rdp->log, WLOG_DEBUG,
"recv %s Data PDU (0x%02" PRIX8
"), length: %" PRIu16
"",
363 data_pdu_type_to_string(type), type, length);
368 case DATA_PDU_TYPE_SYNCHRONIZE:
369 if (!rdp_recv_client_synchronize_pdu(rdp, s))
370 return STATE_RUN_FAILED;
374 case DATA_PDU_TYPE_CONTROL:
375 if (!rdp_server_accept_client_control_pdu(rdp, s))
376 return STATE_RUN_FAILED;
380 case DATA_PDU_TYPE_INPUT:
381 if (!input_recv(rdp->input, s))
382 return STATE_RUN_FAILED;
386 case DATA_PDU_TYPE_BITMAP_CACHE_PERSISTENT_LIST:
387 if (!rdp_server_accept_client_persistent_key_list_pdu(rdp, s))
388 return STATE_RUN_FAILED;
391 case DATA_PDU_TYPE_FONT_LIST:
392 if (!rdp_server_accept_client_font_list_pdu(rdp, s))
393 return STATE_RUN_FAILED;
395 return STATE_RUN_CONTINUE;
397 case DATA_PDU_TYPE_SHUTDOWN_REQUEST:
398 mcs_send_disconnect_provider_ultimatum(rdp->mcs,
399 Disconnect_Ultimatum_provider_initiated);
400 WLog_WARN(TAG,
"disconnect provider ultimatum sent to peer, closing connection");
401 return STATE_RUN_QUIT_SESSION;
403 case DATA_PDU_TYPE_FRAME_ACKNOWLEDGE:
404 if (!Stream_CheckAndLogRequiredLength(TAG, s, 4))
405 return STATE_RUN_FAILED;
407 Stream_Read_UINT32(s, client->ack_frame_id);
408 IFCALL(update->SurfaceFrameAcknowledge, update->context, client->ack_frame_id);
411 case DATA_PDU_TYPE_REFRESH_RECT:
412 if (!update_read_refresh_rect(update, s))
413 return STATE_RUN_FAILED;
417 case DATA_PDU_TYPE_SUPPRESS_OUTPUT:
418 if (!update_read_suppress_output(update, s))
419 return STATE_RUN_FAILED;
424 WLog_ERR(TAG,
"Data PDU type %" PRIu8
"", type);
428 return STATE_RUN_SUCCESS;
431static state_run_t peer_recv_tpkt_pdu(freerdp_peer* client,
wStream* s)
433 state_run_t rc = STATE_RUN_SUCCESS;
436 UINT16 pduSource = 0;
437 UINT16 channelId = 0;
438 UINT16 securityFlags = 0;
441 WINPR_ASSERT(client);
442 WINPR_ASSERT(client->context);
444 rdpRdp* rdp = client->context->rdp;
446 WINPR_ASSERT(rdp->mcs);
448 rdpSettings* settings = client->context->settings;
449 WINPR_ASSERT(settings);
451 if (!rdp_read_header(rdp, s, &length, &channelId))
452 return STATE_RUN_FAILED;
455 if (freerdp_shall_disconnect_context(rdp->context))
456 return STATE_RUN_SUCCESS;
458 if (rdp_get_state(rdp) <= CONNECTION_STATE_LICENSING)
460 return rdp_handle_message_channel(rdp, s, channelId, length);
463 if (!rdp_handle_optional_rdp_decryption(rdp, s, &length, &securityFlags))
464 return STATE_RUN_FAILED;
466 if (channelId == MCS_GLOBAL_CHANNEL_ID)
468 char buffer[256] = { 0 };
469 UINT16 pduLength = 0;
471 if (!rdp_read_share_control_header(rdp, s, &pduLength, &remain, &pduType, &pduSource))
472 return STATE_RUN_FAILED;
474 settings->PduSource = pduSource;
476 WLog_DBG(TAG,
"Received %s", pdu_type_to_str(pduType, buffer,
sizeof(buffer)));
480 rc = peer_recv_data_pdu(client, s, pduLength);
483 case PDU_TYPE_CONFIRM_ACTIVE:
484 if (!rdp_server_accept_confirm_active(rdp, s, pduLength))
485 return STATE_RUN_FAILED;
489 case PDU_TYPE_FLOW_RESPONSE:
490 case PDU_TYPE_FLOW_STOP:
491 case PDU_TYPE_FLOW_TEST:
492 if (!Stream_SafeSeek(s, remain))
494 WLog_WARN(TAG,
"Short PDU, need %" PRIuz
" bytes, got %" PRIuz, remain,
495 Stream_GetRemainingLength(s));
496 return STATE_RUN_FAILED;
501 WLog_ERR(TAG,
"Client sent unknown pduType %" PRIu16
"", pduType);
502 return STATE_RUN_FAILED;
505 else if ((rdp->mcs->messageChannelId > 0) && (channelId == rdp->mcs->messageChannelId))
507 if (!settings->UseRdpSecurityLayer)
509 if (!rdp_read_security_header(rdp, s, &securityFlags, NULL))
510 return STATE_RUN_FAILED;
513 return rdp_recv_message_channel_pdu(rdp, s, securityFlags);
517 if (!freerdp_channel_peer_process(client, s, channelId))
518 return STATE_RUN_FAILED;
520 if (!tpkt_ensure_stream_consumed(rdp->log, s, length))
521 return STATE_RUN_FAILED;
526static state_run_t peer_recv_handle_auto_detect(freerdp_peer* client,
wStream* s)
528 state_run_t ret = STATE_RUN_FAILED;
531 WINPR_ASSERT(client);
533 WINPR_ASSERT(client->context);
535 rdp = client->context->rdp;
538 const rdpSettings* settings = client->context->settings;
539 WINPR_ASSERT(settings);
543 switch (rdp_get_state(rdp))
545 case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_REQUEST:
546 autodetect_on_connect_time_auto_detect_begin(rdp->autodetect);
547 switch (autodetect_get_state(rdp->autodetect))
549 case FREERDP_AUTODETECT_STATE_REQUEST:
550 ret = STATE_RUN_SUCCESS;
551 if (!rdp_server_transition_to_state(
552 rdp, CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_RESPONSE))
553 return STATE_RUN_FAILED;
555 case FREERDP_AUTODETECT_STATE_COMPLETE:
556 ret = STATE_RUN_CONTINUE;
557 if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_LICENSING))
558 return STATE_RUN_FAILED;
564 case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_RESPONSE:
565 ret = peer_recv_pdu(client, s);
566 if (state_run_success(ret))
568 autodetect_on_connect_time_auto_detect_progress(rdp->autodetect);
569 switch (autodetect_get_state(rdp->autodetect))
571 case FREERDP_AUTODETECT_STATE_REQUEST:
572 ret = STATE_RUN_SUCCESS;
574 case FREERDP_AUTODETECT_STATE_COMPLETE:
575 ret = STATE_RUN_CONTINUE;
576 if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_LICENSING))
577 return STATE_RUN_FAILED;
591 if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_LICENSING))
592 return STATE_RUN_FAILED;
594 ret = STATE_RUN_CONTINUE;
600static state_run_t peer_recv_handle_licensing(freerdp_peer* client,
wStream* s)
602 state_run_t ret = STATE_RUN_FAILED;
604 rdpSettings* settings = NULL;
606 WINPR_ASSERT(client);
608 WINPR_ASSERT(client->context);
610 rdp = client->context->rdp;
613 settings = rdp->settings;
614 WINPR_ASSERT(settings);
616 switch (license_get_state(rdp->license))
618 case LICENSE_STATE_INITIAL:
620 const BOOL required =
625 if (!license_server_configure(rdp->license))
626 ret = STATE_RUN_FAILED;
627 else if (!license_server_send_request(rdp->license))
628 ret = STATE_RUN_FAILED;
630 ret = STATE_RUN_SUCCESS;
634 if (license_send_valid_client_error_packet(rdp))
635 ret = STATE_RUN_CONTINUE;
639 case LICENSE_STATE_COMPLETED:
640 ret = STATE_RUN_CONTINUE;
642 case LICENSE_STATE_ABORTED:
643 ret = STATE_RUN_FAILED;
646 ret = peer_recv_pdu(client, s);
653static state_run_t peer_recv_fastpath_pdu(freerdp_peer* client,
wStream* s)
658 rdpFastPath* fastpath = NULL;
661 WINPR_ASSERT(client);
662 WINPR_ASSERT(client->context);
664 rdp = client->context->rdp;
667 fastpath = rdp->fastpath;
668 WINPR_ASSERT(fastpath);
670 rc = fastpath_read_header_rdp(fastpath, s, &length);
672 if (!rc || (length == 0))
674 WLog_ERR(TAG,
"incorrect FastPath PDU header length %" PRIu16
"", length);
675 return STATE_RUN_FAILED;
677 if (!Stream_CheckAndLogRequiredLength(TAG, s, length))
678 return STATE_RUN_FAILED;
680 if (!fastpath_decrypt(fastpath, s, &length))
681 return STATE_RUN_FAILED;
685 return fastpath_recv_inputs(fastpath, s);
688state_run_t peer_recv_pdu(freerdp_peer* client,
wStream* s)
690 int rc = tpkt_verify_header(s);
693 return peer_recv_tpkt_pdu(client, s);
695 return peer_recv_fastpath_pdu(client, s);
697 return STATE_RUN_FAILED;
700static state_run_t peer_unexpected_client_message(rdpRdp* rdp, UINT32 flag)
702 char buffer[1024] = { 0 };
703 WLog_WARN(TAG,
"Unexpected client message in state %s, missing flag %s",
704 rdp_get_state_string(rdp), rdp_finalize_flags_to_str(flag, buffer,
sizeof(buffer)));
705 return STATE_RUN_SUCCESS;
708state_run_t rdp_peer_handle_state_demand_active(freerdp_peer* client)
710 state_run_t ret = STATE_RUN_FAILED;
712 WINPR_ASSERT(client);
713 WINPR_ASSERT(client->context);
715 rdpRdp* rdp = client->context->rdp;
718 if (client->Capabilities && !client->Capabilities(client))
720 WLog_ERR(TAG,
"[%s] freerdp_peer::Capabilities() callback failed",
721 rdp_get_state_string(rdp));
723 else if (!rdp_send_demand_active(rdp))
725 WLog_ERR(TAG,
"[%s] rdp_send_demand_active() fail", rdp_get_state_string(rdp));
729 if (!rdp_server_transition_to_state(rdp,
730 CONNECTION_STATE_CAPABILITIES_EXCHANGE_MONITOR_LAYOUT))
731 return STATE_RUN_FAILED;
732 ret = STATE_RUN_CONTINUE;
743static state_run_t rdp_peer_handle_state_active(freerdp_peer* client)
745 state_run_t ret = STATE_RUN_FAILED;
747 WINPR_ASSERT(client);
748 WINPR_ASSERT(client->context);
750 if (!client->connected)
756 IFCALLRET(client->PostConnect, client->connected, client);
758 if (!client->connected)
760 WLog_ERR(TAG,
"PostConnect for peer %p failed", client);
761 ret = STATE_RUN_FAILED;
763 else if (!client->activated)
765 BOOL activated = TRUE;
770 client->activated = TRUE;
771 IFCALLRET(client->Activate, activated, client);
775 WLog_ERR(TAG,
"Activate for peer %p failed", client);
776 ret = STATE_RUN_FAILED;
779 ret = STATE_RUN_SUCCESS;
782 ret = STATE_RUN_ACTIVE;
786static state_run_t peer_recv_callback_internal(WINPR_ATTR_UNUSED rdpTransport* transport,
789 UINT32 SelectedProtocol = 0;
790 freerdp_peer* client = (freerdp_peer*)extra;
792 state_run_t ret = STATE_RUN_FAILED;
793 rdpSettings* settings = NULL;
795 WINPR_ASSERT(transport);
796 WINPR_ASSERT(client);
797 WINPR_ASSERT(client->context);
799 rdp = client->context->rdp;
802 settings = client->context->settings;
803 WINPR_ASSERT(settings);
805 IFCALL(client->ReachedState, client, rdp_get_state(rdp));
806 switch (rdp_get_state(rdp))
808 case CONNECTION_STATE_INITIAL:
809 if (!freerdp_settings_enforce_consistency(settings))
810 ret = STATE_RUN_FAILED;
811 else if (rdp_server_transition_to_state(rdp, CONNECTION_STATE_NEGO))
812 ret = STATE_RUN_CONTINUE;
815 case CONNECTION_STATE_NEGO:
816 if (!rdp_server_accept_nego(rdp, s))
818 WLog_ERR(TAG,
"%s - rdp_server_accept_nego() fail", rdp_get_state_string(rdp));
822 SelectedProtocol = nego_get_selected_protocol(rdp->nego);
823 settings->RdstlsSecurity = (SelectedProtocol & PROTOCOL_RDSTLS) ? TRUE : FALSE;
824 settings->NlaSecurity = (SelectedProtocol & PROTOCOL_HYBRID) ? TRUE : FALSE;
825 settings->TlsSecurity = (SelectedProtocol & PROTOCOL_SSL) ? TRUE : FALSE;
826 settings->RdpSecurity = (SelectedProtocol == PROTOCOL_RDP) ? TRUE : FALSE;
828 if (SelectedProtocol & PROTOCOL_HYBRID)
832 sspi_CopyAuthIdentity(&client->identity, identity);
833 IFCALLRET(client->Logon, client->authenticated, client, &client->identity,
835 nego_free_nla(rdp->nego);
839 IFCALLRET(client->Logon, client->authenticated, client, &client->identity,
842 if (rdp_server_transition_to_state(rdp, CONNECTION_STATE_MCS_CREATE_REQUEST))
843 ret = STATE_RUN_SUCCESS;
847 case CONNECTION_STATE_NLA:
851 case CONNECTION_STATE_MCS_CREATE_REQUEST:
852 if (!rdp_server_accept_mcs_connect_initial(rdp, s))
856 "rdp_server_accept_mcs_connect_initial() fail",
857 rdp_get_state_string(rdp));
860 ret = STATE_RUN_SUCCESS;
864 case CONNECTION_STATE_MCS_ERECT_DOMAIN:
865 if (!rdp_server_accept_mcs_erect_domain_request(rdp, s))
869 "rdp_server_accept_mcs_erect_domain_request() fail",
870 rdp_get_state_string(rdp));
873 ret = STATE_RUN_SUCCESS;
877 case CONNECTION_STATE_MCS_ATTACH_USER:
878 if (!rdp_server_accept_mcs_attach_user_request(rdp, s))
882 "rdp_server_accept_mcs_attach_user_request() fail",
883 rdp_get_state_string(rdp));
886 ret = STATE_RUN_SUCCESS;
890 case CONNECTION_STATE_MCS_CHANNEL_JOIN_REQUEST:
891 if (!rdp_server_accept_mcs_channel_join_request(rdp, s))
895 "rdp_server_accept_mcs_channel_join_request() fail",
896 rdp_get_state_string(rdp));
899 ret = STATE_RUN_SUCCESS;
902 case CONNECTION_STATE_RDP_SECURITY_COMMENCEMENT:
903 ret = STATE_RUN_SUCCESS;
905 if (!rdp_server_establish_keys(rdp, s))
909 "rdp_server_establish_keys() fail",
910 rdp_get_state_string(rdp));
911 ret = STATE_RUN_FAILED;
914 if (state_run_success(ret))
916 if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_SECURE_SETTINGS_EXCHANGE))
917 ret = STATE_RUN_FAILED;
918 else if (Stream_GetRemainingLength(s) > 0)
919 ret = STATE_RUN_CONTINUE;
923 case CONNECTION_STATE_SECURE_SETTINGS_EXCHANGE:
924 if (rdp_recv_client_info(rdp, s))
926 if (rdp_server_transition_to_state(
927 rdp, CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_REQUEST))
928 ret = STATE_RUN_CONTINUE;
932 case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_REQUEST:
933 case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_RESPONSE:
934 ret = peer_recv_handle_auto_detect(client, s);
937 case CONNECTION_STATE_LICENSING:
938 ret = peer_recv_handle_licensing(client, s);
939 if (ret == STATE_RUN_CONTINUE)
941 if (!rdp_server_transition_to_state(
942 rdp, CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_REQUEST))
943 ret = STATE_RUN_FAILED;
947 case CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_REQUEST:
948 if (settings->SupportMultitransport &&
949 ((settings->MultitransportFlags & INITIATE_REQUEST_PROTOCOL_UDPFECR) != 0))
952 ret = multitransport_server_request(rdp->multitransport,
953 INITIATE_REQUEST_PROTOCOL_UDPFECR);
956 case STATE_RUN_SUCCESS:
957 rdp_server_transition_to_state(
958 rdp, CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_RESPONSE);
960 case STATE_RUN_CONTINUE:
962 rdp_server_transition_to_state(
963 rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE);
971 if (rdp_server_transition_to_state(
972 rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE))
973 ret = STATE_RUN_CONTINUE;
976 case CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_RESPONSE:
977 ret = peer_recv_pdu(client, s);
980 case CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE:
981 ret = rdp_peer_handle_state_demand_active(client);
984 case CONNECTION_STATE_CAPABILITIES_EXCHANGE_MONITOR_LAYOUT:
989 IFCALL(client->AdjustMonitorsLayout, client);
992 ret = STATE_RUN_SUCCESS;
999 .width = WINPR_ASSERTING_INT_CAST(int32_t, w),
1000 .height = WINPR_ASSERTING_INT_CAST(int32_t, h),
1003 .attributes = { .physicalWidth = w,
1004 .physicalHeight = h,
1006 ORIENTATION_LANDSCAPE,
1007 .desktopScaleFactor = 100,
1008 .deviceScaleFactor = 100 } };
1009 if (!freerdp_settings_set_pointer_array(settings, FreeRDP_MonitorDefArray, 0,
1011 ret = STATE_RUN_FAILED;
1013 ret = STATE_RUN_FAILED;
1015 if (state_run_failed(ret))
1018 else if (!display_convert_rdp_monitor_to_monitor_def(
1019 settings->MonitorCount, settings->MonitorDefArray, &monitors))
1021 ret = STATE_RUN_FAILED;
1023 else if (!freerdp_display_send_monitor_layout(rdp->context, settings->MonitorCount,
1026 ret = STATE_RUN_FAILED;
1029 ret = STATE_RUN_SUCCESS;
1032 const size_t len = Stream_GetRemainingLength(s);
1033 if (!state_run_failed(ret) && (len > 0))
1034 ret = STATE_RUN_CONTINUE;
1038 const size_t len = Stream_GetRemainingLength(s);
1040 ret = STATE_RUN_CONTINUE;
1042 ret = STATE_RUN_SUCCESS;
1044 if (state_run_success(ret))
1046 if (!rdp_server_transition_to_state(
1047 rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE_CONFIRM_ACTIVE))
1048 ret = STATE_RUN_FAILED;
1052 case CONNECTION_STATE_CAPABILITIES_EXCHANGE_CONFIRM_ACTIVE:
1057 ret = peer_recv_pdu(client, s);
1060 case CONNECTION_STATE_FINALIZATION_SYNC:
1061 ret = peer_recv_pdu(client, s);
1062 if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_SYNCHRONIZE_PDU))
1064 if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_FINALIZATION_COOPERATE))
1065 ret = STATE_RUN_FAILED;
1068 ret = peer_unexpected_client_message(rdp, FINALIZE_CS_SYNCHRONIZE_PDU);
1070 case CONNECTION_STATE_FINALIZATION_COOPERATE:
1071 ret = peer_recv_pdu(client, s);
1072 if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_CONTROL_COOPERATE_PDU))
1074 if (!rdp_server_transition_to_state(rdp,
1075 CONNECTION_STATE_FINALIZATION_REQUEST_CONTROL))
1076 ret = STATE_RUN_FAILED;
1079 ret = peer_unexpected_client_message(rdp, FINALIZE_CS_CONTROL_COOPERATE_PDU);
1081 case CONNECTION_STATE_FINALIZATION_REQUEST_CONTROL:
1082 ret = peer_recv_pdu(client, s);
1083 if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_CONTROL_REQUEST_PDU))
1085 if (!rdp_send_server_control_granted_pdu(rdp))
1086 ret = STATE_RUN_FAILED;
1087 else if (!rdp_server_transition_to_state(
1088 rdp, CONNECTION_STATE_FINALIZATION_PERSISTENT_KEY_LIST))
1089 ret = STATE_RUN_FAILED;
1092 ret = peer_unexpected_client_message(rdp, FINALIZE_CS_CONTROL_REQUEST_PDU);
1094 case CONNECTION_STATE_FINALIZATION_PERSISTENT_KEY_LIST:
1096 !rdp_finalize_is_flag_set(rdp, FINALIZE_DEACTIVATE_REACTIVATE))
1098 ret = peer_recv_pdu(client, s);
1100 if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_PERSISTENT_KEY_LIST_PDU))
1102 if (!rdp_server_transition_to_state(rdp,
1103 CONNECTION_STATE_FINALIZATION_FONT_LIST))
1104 ret = STATE_RUN_FAILED;
1107 ret = peer_unexpected_client_message(rdp,
1108 CONNECTION_STATE_FINALIZATION_FONT_LIST);
1112 if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_FINALIZATION_FONT_LIST))
1113 ret = STATE_RUN_FAILED;
1115 ret = STATE_RUN_CONTINUE;
1118 case CONNECTION_STATE_FINALIZATION_FONT_LIST:
1119 ret = peer_recv_pdu(client, s);
1120 if (state_run_success(ret))
1122 if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_FONT_LIST_PDU))
1124 if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_ACTIVE))
1125 ret = STATE_RUN_FAILED;
1128 update_reset_state(rdp->update);
1129 ret = STATE_RUN_CONTINUE;
1133 ret = peer_unexpected_client_message(rdp, FINALIZE_CS_FONT_LIST_PDU);
1137 case CONNECTION_STATE_ACTIVE:
1138 ret = rdp_peer_handle_state_active(client);
1139 if (ret >= STATE_RUN_ACTIVE)
1140 ret = peer_recv_pdu(client, s);
1144 case CONNECTION_STATE_FINALIZATION_CLIENT_SYNC:
1145 case CONNECTION_STATE_FINALIZATION_CLIENT_COOPERATE:
1146 case CONNECTION_STATE_FINALIZATION_CLIENT_GRANTED_CONTROL:
1147 case CONNECTION_STATE_FINALIZATION_CLIENT_FONT_MAP:
1149 WLog_ERR(TAG,
"%s state %d", rdp_get_state_string(rdp), rdp_get_state(rdp));
1156static state_run_t peer_recv_callback(rdpTransport* transport,
wStream* s,
void* extra)
1158 char buffer[64] = { 0 };
1159 state_run_t rc = STATE_RUN_FAILED;
1160 const size_t start = Stream_GetPosition(s);
1161 const rdpContext* context = transport_get_context(transport);
1162 DWORD level = WLOG_TRACE;
1163 static wLog* log = NULL;
1165 log = WLog_Get(TAG);
1167 WINPR_ASSERT(context);
1170 const rdpRdp* rdp = context->rdp;
1171 const char* old = rdp_get_state_string(rdp);
1173 if (rc == STATE_RUN_TRY_AGAIN)
1174 Stream_SetPosition(s, start);
1175 rc = peer_recv_callback_internal(transport, s, extra);
1177 const size_t len = Stream_GetRemainingLength(s);
1178 if ((len > 0) && !state_run_continue(rc))
1180 WLog_Print(log, level,
1181 "(server)[%s -> %s] current return %s [%" PRIuz
" bytes not processed]", old,
1182 rdp_get_state_string(rdp), state_run_result_string(rc, buffer,
sizeof(buffer)),
1184 }
while (state_run_continue(rc));
1189static BOOL freerdp_peer_close(freerdp_peer* client)
1191 UINT32 SelectedProtocol = 0;
1192 rdpContext* context = NULL;
1194 WINPR_ASSERT(client);
1196 context = client->context;
1197 WINPR_ASSERT(context);
1198 WINPR_ASSERT(context->settings);
1199 WINPR_ASSERT(context->rdp);
1204 SelectedProtocol = nego_get_selected_protocol(context->rdp->nego);
1206 if (SelectedProtocol & PROTOCOL_FAILED_NEGO)
1214 if (!rdp_send_deactivate_all(context->rdp))
1219 rdp_send_error_info(context->rdp);
1222 return mcs_send_disconnect_provider_ultimatum(context->rdp->mcs,
1223 Disconnect_Ultimatum_provider_initiated);
1226static void freerdp_peer_disconnect(freerdp_peer* client)
1228 rdpTransport* transport = NULL;
1229 WINPR_ASSERT(client);
1231 transport = freerdp_get_transport(client->context);
1232 transport_disconnect(transport);
1235static BOOL freerdp_peer_send_channel_data(freerdp_peer* client, UINT16 channelId,
const BYTE* data,
1238 WINPR_ASSERT(client);
1239 WINPR_ASSERT(client->context);
1240 WINPR_ASSERT(client->context->rdp);
1241 return rdp_send_channel_data(client->context->rdp, channelId, data, size);
1244static BOOL freerdp_peer_send_server_redirection_pdu(freerdp_peer* peer,
1245 const rdpRedirection* redirection)
1249 WINPR_ASSERT(peer->context);
1251 UINT16 sec_flags = 0;
1252 wStream* s = rdp_send_stream_pdu_init(peer->context->rdp, &sec_flags);
1255 if (!rdp_write_enhanced_security_redirection_packet(s, redirection))
1257 if (!rdp_send_pdu(peer->context->rdp, s, PDU_TYPE_SERVER_REDIRECTION, 0, sec_flags))
1259 rc = rdp_reset_runtime_settings(peer->context->rdp);
1265static BOOL freerdp_peer_send_channel_packet(freerdp_peer* client, UINT16 channelId,
1266 size_t totalSize, UINT32 flags,
const BYTE* data,
1269 WINPR_ASSERT(client);
1270 WINPR_ASSERT(client->context);
1271 WINPR_ASSERT(client->context->rdp);
1272 return rdp_channel_send_packet(client->context->rdp, channelId, totalSize, flags, data,
1276static BOOL freerdp_peer_is_write_blocked(freerdp_peer* peer)
1278 rdpTransport* transport = NULL;
1280 WINPR_ASSERT(peer->context);
1281 WINPR_ASSERT(peer->context->rdp);
1282 WINPR_ASSERT(peer->context->rdp->transport);
1283 transport = peer->context->rdp->transport;
1284 return transport_is_write_blocked(transport);
1287static int freerdp_peer_drain_output_buffer(freerdp_peer* peer)
1289 rdpTransport* transport = NULL;
1291 WINPR_ASSERT(peer->context);
1292 WINPR_ASSERT(peer->context->rdp);
1293 WINPR_ASSERT(peer->context->rdp->transport);
1294 transport = peer->context->rdp->transport;
1295 return transport_drain_output_buffer(transport);
1298static BOOL freerdp_peer_has_more_to_read(freerdp_peer* peer)
1301 WINPR_ASSERT(peer->context);
1302 WINPR_ASSERT(peer->context->rdp);
1303 return transport_have_more_bytes_to_read(peer->context->rdp->transport);
1306static LicenseCallbackResult freerdp_peer_nolicense(freerdp_peer* peer,
1312 WINPR_ASSERT(peer->context);
1314 rdp = peer->context->rdp;
1316 if (!license_send_valid_client_error_packet(rdp))
1318 WLog_ERR(TAG,
"freerdp_peer_nolicense: license_send_valid_client_error_packet() failed");
1319 return LICENSE_CB_ABORT;
1322 return LICENSE_CB_COMPLETED;
1325BOOL freerdp_peer_context_new(freerdp_peer* client)
1327 return freerdp_peer_context_new_ex(client, NULL);
1330void freerdp_peer_context_free(freerdp_peer* client)
1335 IFCALL(client->ContextFree, client, client->context);
1337 if (client->context)
1339 rdpContext* ctx = client->context;
1341 (void)CloseHandle(ctx->channelErrorEvent);
1342 ctx->channelErrorEvent = NULL;
1343 free(ctx->errorDescription);
1344 ctx->errorDescription = NULL;
1347 metrics_free(ctx->metrics);
1348 ctx->metrics = NULL;
1349 stream_dump_free(ctx->dump);
1353 client->context = NULL;
1356static const char* os_major_type_to_string(UINT16 osMajorType)
1358 switch (osMajorType)
1360 case OSMAJORTYPE_UNSPECIFIED:
1361 return "Unspecified platform";
1362 case OSMAJORTYPE_WINDOWS:
1363 return "Windows platform";
1364 case OSMAJORTYPE_OS2:
1365 return "OS/2 platform";
1366 case OSMAJORTYPE_MACINTOSH:
1367 return "Macintosh platform";
1368 case OSMAJORTYPE_UNIX:
1369 return "UNIX platform";
1370 case OSMAJORTYPE_IOS:
1371 return "iOS platform";
1372 case OSMAJORTYPE_OSX:
1373 return "OS X platform";
1374 case OSMAJORTYPE_ANDROID:
1375 return "Android platform";
1376 case OSMAJORTYPE_CHROME_OS:
1377 return "Chrome OS platform";
1382 return "Unknown platform";
1385const char* freerdp_peer_os_major_type_string(freerdp_peer* client)
1387 WINPR_ASSERT(client);
1389 rdpContext* context = client->context;
1390 WINPR_ASSERT(context);
1391 WINPR_ASSERT(context->settings);
1394 WINPR_ASSERT(osMajorType <= UINT16_MAX);
1395 return os_major_type_to_string((UINT16)osMajorType);
1398static const char* os_minor_type_to_string(UINT16 osMinorType)
1400 switch (osMinorType)
1402 case OSMINORTYPE_UNSPECIFIED:
1403 return "Unspecified version";
1404 case OSMINORTYPE_WINDOWS_31X:
1405 return "Windows 3.1x";
1406 case OSMINORTYPE_WINDOWS_95:
1407 return "Windows 95";
1408 case OSMINORTYPE_WINDOWS_NT:
1409 return "Windows NT";
1410 case OSMINORTYPE_OS2_V21:
1412 case OSMINORTYPE_POWER_PC:
1414 case OSMINORTYPE_MACINTOSH:
1416 case OSMINORTYPE_NATIVE_XSERVER:
1417 return "Native X Server";
1418 case OSMINORTYPE_PSEUDO_XSERVER:
1419 return "Pseudo X Server";
1420 case OSMINORTYPE_WINDOWS_RT:
1421 return "Windows RT";
1426 return "Unknown version";
1429const char* freerdp_peer_os_minor_type_string(freerdp_peer* client)
1431 WINPR_ASSERT(client);
1433 rdpContext* context = client->context;
1434 WINPR_ASSERT(context);
1435 WINPR_ASSERT(context->settings);
1438 WINPR_ASSERT(osMinorType <= UINT16_MAX);
1439 return os_minor_type_to_string((UINT16)osMinorType);
1442freerdp_peer* freerdp_peer_new(
int sockfd)
1444 UINT32 option_value = 0;
1445 socklen_t option_len = 0;
1446 freerdp_peer* client = (freerdp_peer*)calloc(1,
sizeof(freerdp_peer));
1451 option_value = TRUE;
1452 option_len =
sizeof(option_value);
1456 if (setsockopt(sockfd, IPPROTO_TCP, TCP_NODELAY, (
void*)&option_value, option_len) < 0)
1460 WLog_DBG(TAG,
"can't set TCP_NODELAY, continuing anyway");
1466 client->sockfd = sockfd;
1467 client->ContextSize =
sizeof(rdpContext);
1468 client->Initialize = freerdp_peer_initialize;
1469#if defined(WITH_FREERDP_DEPRECATED)
1470 client->GetFileDescriptor = freerdp_peer_get_fds;
1472 client->GetEventHandle = freerdp_peer_get_event_handle;
1473 client->GetEventHandles = freerdp_peer_get_event_handles;
1474 client->CheckFileDescriptor = freerdp_peer_check_fds;
1475 client->Close = freerdp_peer_close;
1476 client->Disconnect = freerdp_peer_disconnect;
1477 client->SendChannelData = freerdp_peer_send_channel_data;
1478 client->SendChannelPacket = freerdp_peer_send_channel_packet;
1479 client->SendServerRedirection = freerdp_peer_send_server_redirection_pdu;
1480 client->IsWriteBlocked = freerdp_peer_is_write_blocked;
1481 client->DrainOutputBuffer = freerdp_peer_drain_output_buffer;
1482 client->HasMoreToRead = freerdp_peer_has_more_to_read;
1483 client->VirtualChannelOpen = freerdp_peer_virtual_channel_open;
1484 client->VirtualChannelClose = freerdp_peer_virtual_channel_close;
1485 client->VirtualChannelWrite = freerdp_peer_virtual_channel_write;
1486 client->VirtualChannelRead = NULL;
1487 client->VirtualChannelGetData = freerdp_peer_virtual_channel_get_data;
1488 client->VirtualChannelSetData = freerdp_peer_virtual_channel_set_data;
1489 client->SetState = freerdp_peer_set_state;
1495void freerdp_peer_free(freerdp_peer* client)
1500 sspi_FreeAuthIdentity(&client->identity);
1501 if (client->sockfd >= 0)
1502 closesocket((SOCKET)client->sockfd);
1506static BOOL freerdp_peer_transport_setup(freerdp_peer* client)
1510 WINPR_ASSERT(client);
1511 WINPR_ASSERT(client->context);
1513 rdp = client->context->rdp;
1516 if (!transport_attach(rdp->transport, client->sockfd))
1518 client->sockfd = -1;
1520 if (!transport_set_recv_callbacks(rdp->transport, peer_recv_callback, client))
1523 if (!transport_set_blocking_mode(rdp->transport, FALSE))
1529BOOL freerdp_peer_context_new_ex(freerdp_peer* client,
const rdpSettings* settings)
1532 rdpContext* context = NULL;
1538 WINPR_ASSERT(client->ContextSize >=
sizeof(rdpContext));
1539 if (!(context = (rdpContext*)calloc(1, client->ContextSize)))
1542 client->context = context;
1543 context->peer = client;
1544 context->ServerMode = TRUE;
1545 context->log = WLog_Get(TAG);
1552 if (!context->settings)
1556 context->dump = stream_dump_new();
1559 if (!(context->metrics = metrics_new(context)))
1562 if (!(rdp = rdp_new(context)))
1565 rdp_log_build_warnings(rdp);
1567#if defined(WITH_FREERDP_DEPRECATED)
1568 client->update = rdp->update;
1569 client->settings = rdp->settings;
1570 client->autodetect = rdp->autodetect;
1573 context->input = rdp->input;
1574 context->update = rdp->update;
1575 context->settings = rdp->settings;
1576 context->autodetect = rdp->autodetect;
1577 update_register_server_callbacks(rdp->update);
1578 autodetect_register_server_callbacks(rdp->autodetect);
1580 if (!(context->channelErrorEvent = CreateEvent(NULL, TRUE, FALSE, NULL)))
1582 WLog_ERR(TAG,
"CreateEvent failed!");
1586 if (!(context->errorDescription = calloc(1, 500)))
1588 WLog_ERR(TAG,
"calloc failed!");
1592 if (!freerdp_peer_transport_setup(client))
1595 client->IsWriteBlocked = freerdp_peer_is_write_blocked;
1596 client->DrainOutputBuffer = freerdp_peer_drain_output_buffer;
1597 client->HasMoreToRead = freerdp_peer_has_more_to_read;
1598 client->LicenseCallback = freerdp_peer_nolicense;
1599 IFCALLRET(client->ContextNew, ret, client, client->context);
1606 WLog_ERR(TAG,
"ContextNew callback failed");
1607 freerdp_peer_context_free(client);
FREERDP_API UINT32 freerdp_settings_get_uint32(const rdpSettings *settings, FreeRDP_Settings_Keys_UInt32 id)
Returns a UINT32 settings value.
FREERDP_API BOOL freerdp_settings_get_bool(const rdpSettings *settings, FreeRDP_Settings_Keys_Bool id)
Returns a boolean settings value.
FREERDP_API rdpSettings * freerdp_settings_clone(const rdpSettings *settings)
Creates a deep copy of settings.
FREERDP_API const void * freerdp_settings_get_pointer(const rdpSettings *settings, FreeRDP_Settings_Keys_Pointer id)
Returns a immutable pointer settings value.
FREERDP_API BOOL freerdp_settings_set_uint32(rdpSettings *settings, FreeRDP_Settings_Keys_UInt32 id, UINT32 param)
Sets a UINT32 settings value.
FREERDP_API BOOL freerdp_settings_set_bool(rdpSettings *settings, FreeRDP_Settings_Keys_Bool id, BOOL param)
Sets a BOOL settings value.