21#include <freerdp/config.h>
30#include <winpr/platform.h>
31#include <winpr/winsock.h>
41#include <sys/socket.h>
42#include <netinet/in.h>
43#include <netinet/tcp.h>
48#ifdef WINPR_HAVE_POLL_H
52#include <sys/select.h>
55#if defined(__FreeBSD__) || defined(__OpenBSD__)
57#define SOL_TCP IPPROTO_TCP
63#define SOL_TCP IPPROTO_TCP
66#define TCP_KEEPIDLE TCP_KEEPALIVE
72#include <winpr/windows.h>
76#define SHUT_RDWR SD_BOTH
77#define close(_fd) closesocket(_fd)
81#include <freerdp/log.h>
83#include <winpr/stream.h>
86#include "../crypto/opensslcompat.h"
88#if defined(HAVE_AF_VSOCK_H)
90#include <linux/vm_sockets.h>
93#define TAG FREERDP_TAG("core")
101} WINPR_BIO_SIMPLE_SOCKET;
103static int transport_bio_simple_init(BIO* bio, SOCKET socket,
int shutdown);
104static int transport_bio_simple_uninit(BIO* bio);
106static int transport_bio_simple_write(BIO* bio,
const char* buf,
int size)
110 WINPR_BIO_SIMPLE_SOCKET* ptr = (WINPR_BIO_SIMPLE_SOCKET*)BIO_get_data(bio);
115 BIO_clear_flags(bio, BIO_FLAGS_WRITE);
116 status = _send(ptr->socket, buf, size, 0);
120 error = WSAGetLastError();
122 if ((error == WSAEWOULDBLOCK) || (error == WSAEINTR) || (error == WSAEINPROGRESS) ||
123 (error == WSAEALREADY))
125 BIO_set_flags(bio, (BIO_FLAGS_WRITE | BIO_FLAGS_SHOULD_RETRY));
129 BIO_clear_flags(bio, BIO_FLAGS_SHOULD_RETRY);
136static int transport_bio_simple_read(BIO* bio,
char* buf,
int size)
140 WINPR_BIO_SIMPLE_SOCKET* ptr = (WINPR_BIO_SIMPLE_SOCKET*)BIO_get_data(bio);
145 BIO_clear_flags(bio, BIO_FLAGS_READ);
146 (void)WSAResetEvent(ptr->hEvent);
147 status = _recv(ptr->socket, buf, size, 0);
156 BIO_clear_flags(bio, BIO_FLAGS_SHOULD_RETRY);
160 error = WSAGetLastError();
162 if ((error == WSAEWOULDBLOCK) || (error == WSAEINTR) || (error == WSAEINPROGRESS) ||
163 (error == WSAEALREADY))
165 BIO_set_flags(bio, (BIO_FLAGS_READ | BIO_FLAGS_SHOULD_RETRY));
169 BIO_clear_flags(bio, BIO_FLAGS_SHOULD_RETRY);
175static int transport_bio_simple_puts(WINPR_ATTR_UNUSED BIO* bio, WINPR_ATTR_UNUSED
const char* str)
180static int transport_bio_simple_gets(WINPR_ATTR_UNUSED BIO* bio, WINPR_ATTR_UNUSED
char* str,
181 WINPR_ATTR_UNUSED
int size)
186static long transport_bio_simple_ctrl(BIO* bio,
int cmd,
long arg1,
void* arg2)
189 WINPR_BIO_SIMPLE_SOCKET* ptr = (WINPR_BIO_SIMPLE_SOCKET*)BIO_get_data(bio);
193 case BIO_C_SET_SOCKET:
194 transport_bio_simple_uninit(bio);
195 transport_bio_simple_init(bio, (SOCKET)arg2, (
int)arg1);
197 case BIO_C_GET_SOCKET:
198 if (!BIO_get_init(bio) || !arg2)
201 *((SOCKET*)arg2) = ptr->socket;
203 case BIO_C_GET_EVENT:
204 if (!BIO_get_init(bio) || !arg2)
207 *((HANDLE*)arg2) = ptr->hEvent;
209 case BIO_C_SET_NONBLOCK:
213 flags = fcntl((
int)ptr->socket, F_GETFL);
219 (void)fcntl((
int)ptr->socket, F_SETFL, flags | O_NONBLOCK);
221 (
void)fcntl((
int)ptr->socket, F_SETFL, flags & ~(O_NONBLOCK));
228 case BIO_C_WAIT_READ:
230 int timeout = (int)arg1;
231 int sockfd = (int)ptr->socket;
232#ifdef WINPR_HAVE_POLL_H
233 struct pollfd pollset;
235 pollset.events = POLLIN;
240 status = poll(&pollset, 1, timeout);
241 }
while ((status < 0) && (errno == EINTR));
245 struct timeval tv = { 0 };
247 FD_SET(sockfd, &rset);
251 tv.tv_sec = timeout / 1000;
252 tv.tv_usec = (timeout % 1000) * 1000;
257 status = select(sockfd + 1, &rset, NULL, NULL, timeout ? &tv : NULL);
258 }
while ((status < 0) && (errno == EINTR));
267 case BIO_C_WAIT_WRITE:
269 int timeout = (int)arg1;
270 int sockfd = (int)ptr->socket;
271#ifdef WINPR_HAVE_POLL_H
272 struct pollfd pollset;
274 pollset.events = POLLOUT;
279 status = poll(&pollset, 1, timeout);
280 }
while ((status < 0) && (errno == EINTR));
284 struct timeval tv = { 0 };
286 FD_SET(sockfd, &rset);
290 tv.tv_sec = timeout / 1000;
291 tv.tv_usec = (timeout % 1000) * 1000;
296 status = select(sockfd + 1, NULL, &rset, NULL, timeout ? &tv : NULL);
297 }
while ((status < 0) && (errno == EINTR));
309 transport_bio_simple_uninit(bio);
310 transport_bio_simple_init(bio, (SOCKET) * ((
int*)arg2), (
int)arg1);
317 if (BIO_get_init(bio))
320 *((
int*)arg2) = (int)ptr->socket;
322 status = (int)ptr->socket;
327 case BIO_CTRL_GET_CLOSE:
328 status = BIO_get_shutdown(bio);
331 case BIO_CTRL_SET_CLOSE:
332 BIO_set_shutdown(bio, (
int)arg1);
349static int transport_bio_simple_init(BIO* bio, SOCKET socket,
int shutdown)
351 WINPR_BIO_SIMPLE_SOCKET* ptr = (WINPR_BIO_SIMPLE_SOCKET*)BIO_get_data(bio);
352 ptr->socket = socket;
353 BIO_set_shutdown(bio, shutdown);
354 BIO_set_flags(bio, BIO_FLAGS_SHOULD_RETRY);
355 BIO_set_init(bio, 1);
356 ptr->hEvent = WSACreateEvent();
362 if (WSAEventSelect(ptr->socket, ptr->hEvent, FD_READ | FD_ACCEPT | FD_CLOSE))
364 WLog_ERR(TAG,
"WSAEventSelect returned 0x%08X", WSAGetLastError());
371static int transport_bio_simple_uninit(BIO* bio)
373 WINPR_BIO_SIMPLE_SOCKET* ptr = (WINPR_BIO_SIMPLE_SOCKET*)BIO_get_data(bio);
375 if (BIO_get_shutdown(bio))
377 if (BIO_get_init(bio) && ptr)
379 _shutdown(ptr->socket, SD_BOTH);
380 closesocket(ptr->socket);
385 if (ptr && ptr->hEvent)
387 (void)CloseHandle(ptr->hEvent);
391 BIO_set_init(bio, 0);
392 BIO_set_flags(bio, 0);
396static int transport_bio_simple_new(BIO* bio)
398 WINPR_BIO_SIMPLE_SOCKET* ptr = NULL;
399 BIO_set_flags(bio, BIO_FLAGS_SHOULD_RETRY);
400 ptr = (WINPR_BIO_SIMPLE_SOCKET*)calloc(1,
sizeof(WINPR_BIO_SIMPLE_SOCKET));
405 BIO_set_data(bio, ptr);
409static int transport_bio_simple_free(BIO* bio)
411 WINPR_BIO_SIMPLE_SOCKET* ptr = NULL;
416 transport_bio_simple_uninit(bio);
417 ptr = (WINPR_BIO_SIMPLE_SOCKET*)BIO_get_data(bio);
421 BIO_set_data(bio, NULL);
428BIO_METHOD* BIO_s_simple_socket(
void)
430 static BIO_METHOD* bio_methods = NULL;
432 if (bio_methods == NULL)
434 if (!(bio_methods = BIO_meth_new(BIO_TYPE_SIMPLE,
"SimpleSocket")))
437 BIO_meth_set_write(bio_methods, transport_bio_simple_write);
438 BIO_meth_set_read(bio_methods, transport_bio_simple_read);
439 BIO_meth_set_puts(bio_methods, transport_bio_simple_puts);
440 BIO_meth_set_gets(bio_methods, transport_bio_simple_gets);
441 BIO_meth_set_ctrl(bio_methods, transport_bio_simple_ctrl);
442 BIO_meth_set_create(bio_methods, transport_bio_simple_new);
443 BIO_meth_set_destroy(bio_methods, transport_bio_simple_free);
457} WINPR_BIO_BUFFERED_SOCKET;
459static int transport_bio_buffered_write(BIO* bio,
const char* buf,
int num)
463 size_t committedBytes = 0;
465 WINPR_BIO_BUFFERED_SOCKET* ptr = (WINPR_BIO_BUFFERED_SOCKET*)BIO_get_data(bio);
466 BIO* next_bio = NULL;
473 ptr->writeBlocked = FALSE;
474 BIO_clear_flags(bio, BIO_FLAGS_WRITE);
479 if (buf && (num > 0) && !ringbuffer_write(&ptr->xmitBuffer, (
const BYTE*)buf, (
size_t)num))
481 WLog_ERR(TAG,
"an error occurred when writing (num: %d)", num);
485 nchunks = ringbuffer_peek(&ptr->xmitBuffer, chunks, ringbuffer_used(&ptr->xmitBuffer));
486 next_bio = BIO_next(bio);
488 for (
int i = 0; i < nchunks; i++)
490 while (chunks[i].size)
494 const size_t wr = MIN(INT32_MAX, chunks[i].size);
495 const int status = BIO_write(next_bio, chunks[i].data, (
int)wr);
499 if (!BIO_should_retry(next_bio))
501 BIO_clear_flags(bio, BIO_FLAGS_SHOULD_RETRY);
506 if (BIO_should_write(next_bio))
508 BIO_set_flags(bio, BIO_FLAGS_WRITE);
509 ptr->writeBlocked = TRUE;
515 committedBytes += (size_t)status;
516 chunks[i].size -= (size_t)status;
517 chunks[i].data += status;
523 ringbuffer_commit_read_bytes(&ptr->xmitBuffer, committedBytes);
527static int transport_bio_buffered_read(BIO* bio,
char* buf,
int size)
530 WINPR_BIO_BUFFERED_SOCKET* ptr = (WINPR_BIO_BUFFERED_SOCKET*)BIO_get_data(bio);
531 BIO* next_bio = BIO_next(bio);
532 ptr->readBlocked = FALSE;
533 BIO_clear_flags(bio, BIO_FLAGS_READ);
535 status = BIO_read(next_bio, buf, size);
539 if (!BIO_should_retry(next_bio))
541 BIO_clear_flags(bio, BIO_FLAGS_SHOULD_RETRY);
545 BIO_set_flags(bio, BIO_FLAGS_SHOULD_RETRY);
547 if (BIO_should_read(next_bio))
549 BIO_set_flags(bio, BIO_FLAGS_READ);
550 ptr->readBlocked = TRUE;
559static int transport_bio_buffered_puts(WINPR_ATTR_UNUSED BIO* bio,
560 WINPR_ATTR_UNUSED
const char* str)
565static int transport_bio_buffered_gets(WINPR_ATTR_UNUSED BIO* bio, WINPR_ATTR_UNUSED
char* str,
566 WINPR_ATTR_UNUSED
int size)
571static long transport_bio_buffered_ctrl(BIO* bio,
int cmd,
long arg1,
void* arg2)
574 WINPR_BIO_BUFFERED_SOCKET* ptr = (WINPR_BIO_BUFFERED_SOCKET*)BIO_get_data(bio);
579 if (!ringbuffer_used(&ptr->xmitBuffer))
582 status = (transport_bio_buffered_write(bio, NULL, 0) >= 0) ? 1 : -1;
586 case BIO_CTRL_WPENDING:
587 status = WINPR_ASSERTING_INT_CAST(
long, ringbuffer_used(&ptr->xmitBuffer));
590 case BIO_CTRL_PENDING:
594 case BIO_C_READ_BLOCKED:
595 status = (int)ptr->readBlocked;
598 case BIO_C_WRITE_BLOCKED:
599 status = (int)ptr->writeBlocked;
603 status = BIO_ctrl(BIO_next(bio), cmd, arg1, arg2);
610static int transport_bio_buffered_new(BIO* bio)
612 WINPR_BIO_BUFFERED_SOCKET* ptr = NULL;
613 BIO_set_init(bio, 1);
614 BIO_set_flags(bio, BIO_FLAGS_SHOULD_RETRY);
615 ptr = (WINPR_BIO_BUFFERED_SOCKET*)calloc(1,
sizeof(WINPR_BIO_BUFFERED_SOCKET));
620 BIO_set_data(bio, (
void*)ptr);
622 if (!ringbuffer_init(&ptr->xmitBuffer, 0x10000))
631static int transport_bio_buffered_free(BIO* bio)
633 WINPR_BIO_BUFFERED_SOCKET* ptr = (WINPR_BIO_BUFFERED_SOCKET*)BIO_get_data(bio);
638 ringbuffer_destroy(&ptr->xmitBuffer);
643BIO_METHOD* BIO_s_buffered_socket(
void)
645 static BIO_METHOD* bio_methods = NULL;
647 if (bio_methods == NULL)
649 if (!(bio_methods = BIO_meth_new(BIO_TYPE_BUFFERED,
"BufferedSocket")))
652 BIO_meth_set_write(bio_methods, transport_bio_buffered_write);
653 BIO_meth_set_read(bio_methods, transport_bio_buffered_read);
654 BIO_meth_set_puts(bio_methods, transport_bio_buffered_puts);
655 BIO_meth_set_gets(bio_methods, transport_bio_buffered_gets);
656 BIO_meth_set_ctrl(bio_methods, transport_bio_buffered_ctrl);
657 BIO_meth_set_create(bio_methods, transport_bio_buffered_new);
658 BIO_meth_set_destroy(bio_methods, transport_bio_buffered_free);
664char* freerdp_tcp_address_to_string(
const struct sockaddr_storage* addr, BOOL* pIPv6)
666 char ipAddress[INET6_ADDRSTRLEN + 1] = { 0 };
667 const struct sockaddr_in6* sockaddr_ipv6 = (
const struct sockaddr_in6*)addr;
668 const struct sockaddr_in* sockaddr_ipv4 = (
const struct sockaddr_in*)addr;
675 switch (sockaddr_ipv4->sin_family)
678 if (!inet_ntop(sockaddr_ipv4->sin_family, &sockaddr_ipv4->sin_addr, ipAddress,
685 if (!inet_ntop(sockaddr_ipv6->sin6_family, &sockaddr_ipv6->sin6_addr, ipAddress,
692 (void)sprintf_s(ipAddress, ARRAYSIZE(ipAddress),
"127.0.0.1");
701 *pIPv6 = (sockaddr_ipv4->sin_family == AF_INET6);
704 return _strdup(ipAddress);
707static char* freerdp_tcp_get_ip_address(
int sockfd, BOOL* pIPv6)
709 struct sockaddr_storage saddr = { 0 };
710 socklen_t length =
sizeof(
struct sockaddr_storage);
712 if (getsockname(sockfd, (
struct sockaddr*)&saddr, &length) != 0)
717 return freerdp_tcp_address_to_string(&saddr, pIPv6);
720char* freerdp_tcp_get_peer_address(SOCKET sockfd)
722 struct sockaddr_storage saddr = { 0 };
723 socklen_t length =
sizeof(
struct sockaddr_storage);
725 if (getpeername((
int)sockfd, (
struct sockaddr*)&saddr, &length) != 0)
730 return freerdp_tcp_address_to_string(&saddr, NULL);
733static int freerdp_uds_connect(
const char* path)
738 struct sockaddr_un addr = { 0 };
739 sockfd = socket(AF_UNIX, SOCK_STREAM, 0);
743 WLog_ERR(TAG,
"socket");
747 addr.sun_family = AF_UNIX;
748 strncpy(addr.sun_path, path,
sizeof(addr.sun_path) - 1);
749 status = connect(sockfd, (
struct sockaddr*)&addr,
sizeof(addr));
753 WLog_ERR(TAG,
"connect");
764struct addrinfo* freerdp_tcp_resolve_host(
const char* hostname,
int port,
int ai_flags)
766 char* service = NULL;
769 struct addrinfo hints = { 0 };
770 struct addrinfo* result = NULL;
771 hints.ai_family = AF_UNSPEC;
772 hints.ai_socktype = SOCK_STREAM;
773 hints.ai_flags = ai_flags;
777 (void)sprintf_s(port_str,
sizeof(port_str) - 1,
"%d", port);
781 status = getaddrinfo(hostname, service, &hints, &result);
789static BOOL freerdp_tcp_is_hostname_resolvable(rdpContext* context,
const char* hostname)
791 struct addrinfo* result = freerdp_tcp_resolve_host(hostname, -1, 0);
795 freerdp_set_last_error_if_not(context, FREERDP_ERROR_DNS_NAME_NOT_FOUND);
800 freerdp_set_last_error_log(context, 0);
801 freeaddrinfo(result);
805static BOOL freerdp_tcp_connect_timeout(rdpContext* context,
int sockfd,
struct sockaddr* addr,
806 socklen_t addrlen, UINT32 timeout)
809 HANDLE handles[2] = { 0 };
812 DWORD tout = (timeout > 0) ? timeout : INFINITE;
814 handles[count] = CreateEvent(NULL, TRUE, FALSE, NULL);
819 const int wsastatus = WSAEventSelect((SOCKET)sockfd, handles[count++],
820 FD_READ | FD_WRITE | FD_CONNECT | FD_CLOSE);
824 WLog_ERR(TAG,
"WSAEventSelect failed with %d", WSAGetLastError());
828 handles[count++] = utils_get_abort_event(context->rdp);
829 const int constatus = _connect((SOCKET)sockfd, addr, WINPR_ASSERTING_INT_CAST(
int, addrlen));
833 const int estatus = WSAGetLastError();
846 const DWORD wstatus = WaitForMultipleObjects(count, handles, FALSE, tout);
848 if (WAIT_OBJECT_0 != wstatus)
851 const SSIZE_T res = recv(sockfd, NULL, 0, 0);
853 if (res == SOCKET_ERROR)
855 if (WSAGetLastError() == WSAECONNRESET)
859 const int status = WSAEventSelect((SOCKET)sockfd, handles[0], 0);
863 WLog_ERR(TAG,
"WSAEventSelect failed with %d", WSAGetLastError());
867 if (_ioctlsocket((SOCKET)sockfd, FIONBIO, &arg) != 0)
872 (void)CloseHandle(handles[0]);
879 struct addrinfo* addr;
880 struct addrinfo* result;
883static void peer_free(t_peer* peer)
885 if (peer->s != INVALID_SOCKET)
886 closesocket(peer->s);
888 freeaddrinfo(peer->addr);
889 memset(peer, 0,
sizeof(t_peer));
890 peer->s = INVALID_SOCKET;
893static int freerdp_tcp_connect_multi(rdpContext* context,
char** hostnames,
const UINT32* ports,
894 UINT32 count, UINT16 port, WINPR_ATTR_UNUSED UINT32 timeout)
896 UINT32 sindex = count;
897 SOCKET sockfd = INVALID_SOCKET;
898 struct addrinfo* addr = NULL;
899 struct addrinfo* result = NULL;
901 HANDLE* events = (HANDLE*)calloc(count + 1,
sizeof(HANDLE));
902 t_peer* peers = (t_peer*)calloc(count,
sizeof(t_peer));
904 if (!peers || !events || (count < 1))
911 for (UINT32 index = 0; index < count; index++)
916 curPort = WINPR_ASSERTING_INT_CAST(
int, ports[index]);
918 result = freerdp_tcp_resolve_host(hostnames[index], curPort, 0);
925 if ((addr->ai_family == AF_INET6) && (addr->ai_next != 0))
927 while ((addr = addr->ai_next))
929 if (addr->ai_family == AF_INET)
937 peers[index].s = _socket(addr->ai_family, addr->ai_socktype, addr->ai_protocol);
939 if (peers[index].s == INVALID_SOCKET)
941 freeaddrinfo(result);
945 peers[index].addr = addr;
946 peers[index].result = result;
949 for (UINT32 index = 0; index < count; index++)
951 sockfd = peers[index].s;
952 addr = peers[index].addr;
954 if ((sockfd == INVALID_SOCKET) || (!addr))
959 _connect(sockfd, addr->ai_addr, WINPR_ASSERTING_INT_CAST(
int, addr->ai_addrlen));
971 sockfd = peers[sindex].s;
972 peers[sindex].s = INVALID_SOCKET;
975 freerdp_set_last_error_log(context, FREERDP_ERROR_CONNECT_CANCELLED);
977 for (UINT32 index = 0; index < count; index++)
978 peer_free(&peers[index]);
985BOOL freerdp_tcp_set_keep_alive_mode(
const rdpSettings* settings,
int sockfd)
989 socklen_t optlen = 0;
990 optval = keepalive ? 1 : 0;
991 optlen =
sizeof(optval);
993 if (setsockopt(sockfd, SOL_SOCKET, SO_KEEPALIVE, (
void*)&optval, optlen) < 0)
995 WLog_WARN(TAG,
"setsockopt() SOL_SOCKET, SO_KEEPALIVE");
1001 optlen =
sizeof(optval);
1003 if (setsockopt(sockfd, IPPROTO_TCP, TCP_KEEPIDLE, (
void*)&optval, optlen) < 0)
1005 WLog_WARN(TAG,
"setsockopt() IPPROTO_TCP, TCP_KEEPIDLE");
1015 optlen =
sizeof(optval);
1017 if (setsockopt(sockfd, SOL_TCP, TCP_KEEPCNT, (
void*)&optval, optlen) < 0)
1019 WLog_WARN(TAG,
"setsockopt() SOL_TCP, TCP_KEEPCNT");
1025 optlen =
sizeof(optval);
1027 if (setsockopt(sockfd, SOL_TCP, TCP_KEEPINTVL, (
void*)&optval, optlen) < 0)
1029 WLog_WARN(TAG,
"setsockopt() SOL_TCP, TCP_KEEPINTVL");
1034#if defined(__MACOSX__) || defined(__IOS__)
1036 optlen =
sizeof(optval);
1038 if (setsockopt(sockfd, SOL_SOCKET, SO_NOSIGPIPE, (
void*)&optval, optlen) < 0)
1040 WLog_WARN(TAG,
"setsockopt() SOL_SOCKET, SO_NOSIGPIPE");
1044#ifdef TCP_USER_TIMEOUT
1046 optlen =
sizeof(optval);
1048 if (setsockopt(sockfd, SOL_TCP, TCP_USER_TIMEOUT, (
void*)&optval, optlen) < 0)
1050 WLog_WARN(TAG,
"setsockopt() SOL_TCP, TCP_USER_TIMEOUT");
1057int freerdp_tcp_connect(rdpContext* context,
const char* hostname,
int port, DWORD timeout)
1059 rdpTransport* transport = NULL;
1060 if (!context || !context->rdp)
1062 transport = context->rdp->transport;
1065 return transport_tcp_connect(context->rdp->transport, hostname, port, timeout);
1068static int get_next_addrinfo(rdpContext* context,
struct addrinfo* input,
struct addrinfo** result,
1071 WINPR_ASSERT(context);
1072 WINPR_ASSERT(result);
1074 struct addrinfo* addr = input;
1080 while (addr && (addr->ai_family != AF_INET6))
1081 addr = addr->ai_next;
1093 const int family = (IPvX == 4) ? AF_INET : AF_INET6;
1094 while (addr && (addr->ai_family != family))
1095 addr = addr->ai_next;
1109 freerdp_set_last_error_if_not(context, errorCode);
1110 freeaddrinfo(input);
1114int freerdp_tcp_default_connect(rdpContext* context, rdpSettings* settings,
const char* hostname,
1115 int port, DWORD timeout)
1119 socklen_t optlen = 0;
1120 BOOL ipcSocket = FALSE;
1121 BOOL useExternalDefinedSocket = FALSE;
1125 freerdp_set_last_error_if_not(context, FREERDP_ERROR_CONNECT_FAILED);
1130 if (hostname[0] ==
'/')
1133 if (hostname[0] ==
'|')
1134 useExternalDefinedSocket = TRUE;
1136 const char* vsock = utils_is_vsock(hostname);
1139 sockfd = freerdp_uds_connect(hostname);
1143 freerdp_set_last_error_if_not(context, FREERDP_ERROR_CONNECT_FAILED);
1147 else if (useExternalDefinedSocket)
1151#if defined(HAVE_AF_VSOCK_H)
1153 sockfd = socket(AF_VSOCK, SOCK_STREAM, 0);
1156 char buffer[256] = { 0 };
1157 WLog_WARN(TAG,
"socket(AF_VSOCK, SOCK_STREAM, 0) failed with %s [%d]",
1158 winpr_strerror(errno, buffer,
sizeof(buffer)));
1159 freerdp_set_last_error_if_not(context, FREERDP_ERROR_CONNECT_FAILED);
1163 struct sockaddr_vm addr = { 0 };
1165 addr.svm_family = AF_VSOCK;
1166 addr.svm_port = WINPR_ASSERTING_INT_CAST(typeof(addr.svm_port), port);
1170 unsigned long val = strtoul(hostname, &ptr, 10);
1171 if (errno || (val > UINT32_MAX))
1173 char ebuffer[256] = { 0 };
1174 WLog_ERR(TAG,
"could not extract port from '%s', value=%ul, error=%s", hostname, val,
1175 winpr_strerror(errno, ebuffer,
sizeof(ebuffer)));
1178 addr.svm_cid = WINPR_ASSERTING_INT_CAST(typeof(addr.svm_cid), val);
1179 if (addr.svm_cid == 2)
1181 addr.svm_flags = VMADDR_FLAG_TO_HOST;
1183 if ((connect(sockfd, (
struct sockaddr*)&addr,
sizeof(
struct sockaddr_vm))) == -1)
1185 WLog_ERR(TAG,
"failed to connect to %s", hostname);
1189 WLog_ERR(TAG,
"Compiled without AF_VSOCK, '%s' not supported", hostname);
1197 if (!settings->GatewayEnabled)
1199 if (!freerdp_tcp_is_hostname_resolvable(context, hostname) ||
1200 settings->RemoteAssistanceMode)
1202 if (settings->TargetNetAddressCount > 0)
1204 WINPR_ASSERT(port <= UINT16_MAX);
1205 sockfd = freerdp_tcp_connect_multi(
1206 context, settings->TargetNetAddresses, settings->TargetNetPorts,
1207 settings->TargetNetAddressCount, (UINT16)port, timeout);
1214 char* peerAddress = NULL;
1215 struct addrinfo* addr = NULL;
1216 struct addrinfo* result = NULL;
1218 result = freerdp_tcp_resolve_host(hostname, port, 0);
1222 freerdp_set_last_error_if_not(context, FREERDP_ERROR_DNS_NAME_NOT_FOUND);
1226 freerdp_set_last_error_log(context, 0);
1234 get_next_addrinfo(context, result, &addr, FREERDP_ERROR_DNS_NAME_NOT_FOUND);
1240 sockfd = socket(addr->ai_family, addr->ai_socktype, addr->ai_protocol);
1243 const int lrc = get_next_addrinfo(context, addr->ai_next, &addr,
1244 FREERDP_ERROR_CONNECT_FAILED);
1248 }
while (sockfd < 0);
1250 if ((peerAddress = freerdp_tcp_address_to_string(
1251 (
const struct sockaddr_storage*)addr->ai_addr, NULL)) != NULL)
1253 WLog_DBG(TAG,
"connecting to peer %s", peerAddress);
1257 if (!freerdp_tcp_connect_timeout(context, sockfd, addr->ai_addr, addr->ai_addrlen,
1260 freeaddrinfo(result);
1263 freerdp_set_last_error_if_not(context, FREERDP_ERROR_CONNECT_FAILED);
1265 WLog_ERR(TAG,
"failed to connect to %s", hostname);
1269 freeaddrinfo(result);
1275 free(settings->ClientAddress);
1276 settings->ClientAddress = freerdp_tcp_get_ip_address(sockfd, &settings->IPv6Enabled);
1278 if (!settings->ClientAddress)
1280 if (!useExternalDefinedSocket)
1283 freerdp_set_last_error_if_not(context, FREERDP_ERROR_CONNECT_FAILED);
1285 WLog_ERR(TAG,
"Couldn't get socket ip address");
1291 optlen =
sizeof(optval);
1293 if (!ipcSocket && !useExternalDefinedSocket)
1295 if (setsockopt(sockfd, IPPROTO_TCP, TCP_NODELAY, (
void*)&optval, optlen) < 0)
1296 WLog_ERR(TAG,
"unable to set TCP_NODELAY");
1300 if (getsockopt(sockfd, SOL_SOCKET, SO_RCVBUF, (
void*)&optval, &optlen) == 0)
1302 if (optval < (1024 * 32))
1305 optlen =
sizeof(optval);
1307 if (setsockopt(sockfd, SOL_SOCKET, SO_RCVBUF, (
void*)&optval, optlen) < 0)
1311 freerdp_set_last_error_if_not(context, FREERDP_ERROR_CONNECT_FAILED);
1313 WLog_ERR(TAG,
"unable to set receive buffer len");
1319 if (!ipcSocket && !useExternalDefinedSocket)
1321 if (!freerdp_tcp_set_keep_alive_mode(settings, sockfd))
1325 freerdp_set_last_error_if_not(context, FREERDP_ERROR_CONNECT_FAILED);
1327 WLog_ERR(TAG,
"Couldn't set keep alive mode.");
1332 if (WaitForSingleObject(utils_get_abort_event(context->rdp), 0) == WAIT_OBJECT_0)
1346typedef struct rdp_tcp_layer rdpTcpLayer;
1348static int freerdp_tcp_layer_read(
void* userContext,
void* data,
int bytes)
1352 if (!data || !bytes)
1355 rdpTcpLayer* tcpLayer = (rdpTcpLayer*)userContext;
1360 (void)WSAResetEvent(tcpLayer->hEvent);
1361 status = _recv((SOCKET)tcpLayer->sockfd, data, bytes, 0);
1369 error = WSAGetLastError();
1371 if ((error == WSAEWOULDBLOCK) || (error == WSAEINTR) || (error == WSAEINPROGRESS) ||
1372 (error == WSAEALREADY))
1384static int freerdp_tcp_layer_write(
void* userContext,
const void* data,
int bytes)
1388 if (!data || !bytes)
1391 rdpTcpLayer* tcpLayer = (rdpTcpLayer*)userContext;
1396 status = _send((SOCKET)tcpLayer->sockfd, data, bytes, 0);
1400 error = WSAGetLastError();
1402 if ((error == WSAEWOULDBLOCK) || (error == WSAEINTR) || (error == WSAEINPROGRESS) ||
1403 (error == WSAEALREADY))
1416static BOOL freerdp_tcp_layer_close(
void* userContext)
1421 rdpTcpLayer* tcpLayer = (rdpTcpLayer*)userContext;
1423 if (tcpLayer->sockfd >= 0)
1424 closesocket((SOCKET)tcpLayer->sockfd);
1425 if (tcpLayer->hEvent)
1426 (void)CloseHandle(tcpLayer->hEvent);
1431static BOOL freerdp_tcp_layer_wait(
void* userContext, BOOL waitWrite, DWORD timeout)
1436 rdpTcpLayer* tcpLayer = (rdpTcpLayer*)userContext;
1439 int sockfd = tcpLayer->sockfd;
1440#ifdef WINPR_HAVE_POLL_H
1441 struct pollfd pollset = { 0 };
1442 pollset.fd = sockfd;
1443 pollset.events = waitWrite ? POLLOUT : POLLIN;
1447 status = poll(&pollset, 1, (
int)timeout);
1448 }
while ((status < 0) && (errno == EINTR));
1451 fd_set rset = { 0 };
1452 struct timeval tv = { 0 };
1454 FD_SET(sockfd, &rset);
1458 tv.tv_sec = timeout / 1000;
1459 tv.tv_usec = (timeout % 1000) * 1000;
1465 status = select(sockfd + 1, NULL, &rset, NULL, timeout ? &tv : NULL);
1467 status = select(sockfd + 1, &rset, NULL, NULL, timeout ? &tv : NULL);
1468 }
while ((status < 0) && (errno == EINTR));
1475static HANDLE freerdp_tcp_layer_get_event(
void* userContext)
1480 rdpTcpLayer* tcpLayer = (rdpTcpLayer*)userContext;
1482 return tcpLayer->hEvent;
1485rdpTransportLayer* freerdp_tcp_connect_layer(rdpContext* context,
const char* hostname,
int port,
1488 WINPR_ASSERT(context);
1490 const rdpSettings* settings = context->settings;
1491 WINPR_ASSERT(settings);
1494 rdpTcpLayer* tcpLayer = NULL;
1496 int sockfd = freerdp_tcp_connect(context, hostname, port, timeout);
1499 if (!freerdp_tcp_set_keep_alive_mode(settings, sockfd))
1502 layer = transport_layer_new(freerdp_get_transport(context),
sizeof(rdpTcpLayer));
1506 layer->Read = freerdp_tcp_layer_read;
1507 layer->Write = freerdp_tcp_layer_write;
1508 layer->Close = freerdp_tcp_layer_close;
1509 layer->Wait = freerdp_tcp_layer_wait;
1510 layer->GetEvent = freerdp_tcp_layer_get_event;
1512 tcpLayer = (rdpTcpLayer*)layer->userContext;
1513 WINPR_ASSERT(tcpLayer);
1515 tcpLayer->sockfd = -1;
1516 tcpLayer->hEvent = WSACreateEvent();
1517 if (!tcpLayer->hEvent)
1521 if (WSAEventSelect((SOCKET)sockfd, tcpLayer->hEvent, FD_READ | FD_ACCEPT | FD_CLOSE))
1523 WLog_ERR(TAG,
"WSAEventSelect returned 0x%08X", WSAGetLastError());
1527 tcpLayer->sockfd = sockfd;
1533 closesocket((SOCKET)sockfd);
1534 transport_layer_free(layer);
FREERDP_API UINT32 freerdp_settings_get_uint32(const rdpSettings *settings, FreeRDP_Settings_Keys_UInt32 id)
Returns a UINT32 settings value.
FREERDP_API BOOL freerdp_settings_get_bool(const rdpSettings *settings, FreeRDP_Settings_Keys_Bool id)
Returns a boolean settings value.
a piece of data in the ring buffer, exactly like a glibc iovec