20#include <freerdp/config.h>
24#include <winpr/assert.h>
27#include <winpr/synch.h>
28#include <winpr/print.h>
29#include <winpr/stream.h>
30#include <winpr/winsock.h>
31#include <winpr/crypto.h>
33#include <freerdp/log.h>
34#include <freerdp/error.h>
35#include <freerdp/utils/ringbuffer.h>
37#include <openssl/bio.h>
44#include <sys/socket.h>
47#ifdef FREERDP_HAVE_VALGRIND_MEMCHECK_H
48#include <valgrind/memcheck.h>
58#include "childsession.h"
60#include "gateway/rdg.h"
61#include "gateway/wst.h"
62#include "gateway/arm.h"
64#define TAG FREERDP_TAG("core.transport")
66#define BUFFER_SIZE 16384
70 TRANSPORT_LAYER layer;
80 TransportRecv ReceiveCallback;
81 wStreamPool* ReceivePool;
82 HANDLE connectedEvent;
92 BOOL haveMoreBytesToRead;
100static void transport_ssl_cb(
const SSL* ssl,
int where,
int ret)
102 if (where & SSL_CB_ALERT)
104 rdpTransport* transport = (rdpTransport*)SSL_get_app_data(ssl);
105 WINPR_ASSERT(transport);
109 case (SSL3_AL_FATAL << 8) | SSL_AD_ACCESS_DENIED:
111 if (!freerdp_get_last_error(transport_get_context(transport)))
113 WLog_Print(transport->log, WLOG_ERROR,
"ACCESS DENIED");
114 freerdp_set_last_error_log(transport_get_context(transport),
115 FREERDP_ERROR_AUTHENTICATION_FAILED);
120 case (SSL3_AL_FATAL << 8) | SSL_AD_INTERNAL_ERROR:
122 if (transport->NlaMode)
124 if (!freerdp_get_last_error(transport_get_context(transport)))
128 kret = nla_get_error(transport->nla);
130 kret = FREERDP_ERROR_CONNECT_PASSWORD_CERTAINLY_EXPIRED;
131 freerdp_set_last_error_log(transport_get_context(transport), kret);
137 case (SSL3_AL_WARNING << 8) | SSL3_AD_CLOSE_NOTIFY:
141 WLog_Print(transport->log, WLOG_WARN,
142 "Unhandled SSL error (where=%d, ret=%d [%s, %s])", where, ret,
143 SSL_alert_type_string_long(ret), SSL_alert_desc_string_long(ret));
150wStream* transport_send_stream_init(WINPR_ATTR_UNUSED rdpTransport* transport,
size_t size)
152 WINPR_ASSERT(transport);
154 return Stream_New(NULL, size);
157BOOL transport_attach(rdpTransport* transport,
int sockfd)
161 return IFCALLRESULT(FALSE, transport->io.TransportAttach, transport, sockfd);
164static BOOL transport_default_attach(rdpTransport* transport,
int sockfd)
166 BIO* socketBio = NULL;
167 BIO* bufferedBio = NULL;
168 const rdpSettings* settings = NULL;
169 rdpContext* context = transport_get_context(transport);
173 WLog_WARN(TAG,
"Running peer without socket (sockfd=%d)", sockfd);
177 settings = context->settings;
178 WINPR_ASSERT(settings);
182 if (!freerdp_tcp_set_keep_alive_mode(settings, sockfd))
185 socketBio = BIO_new(BIO_s_simple_socket());
191 bufferedBio = BIO_new(BIO_s_buffered_socket());
197 bufferedBio = BIO_push(bufferedBio, socketBio);
206 BIO_set_fd(socketBio, sockfd, BIO_CLOSE);
208 EnterCriticalSection(&(transport->ReadLock));
209 EnterCriticalSection(&(transport->WriteLock));
210 transport->frontBio = bufferedBio;
211 LeaveCriticalSection(&(transport->WriteLock));
212 LeaveCriticalSection(&(transport->ReadLock));
218 BIO_free_all(socketBio);
220 closesocket((SOCKET)sockfd);
225BOOL transport_connect_rdp(rdpTransport* transport)
230 switch (utils_authenticate(transport_get_context(transport)->instance, AUTH_RDP, FALSE))
234 case AUTH_NO_CREDENTIALS:
237 freerdp_set_last_error_if_not(transport_get_context(transport),
238 FREERDP_ERROR_CONNECT_CANCELLED);
245BOOL transport_connect_tls(rdpTransport* transport)
247 const rdpSettings* settings = NULL;
248 rdpContext* context = transport_get_context(transport);
250 settings = context->settings;
251 WINPR_ASSERT(settings);
254 if (settings->SelectedProtocol == PROTOCOL_SSL)
256 switch (utils_authenticate(context->instance, AUTH_TLS, FALSE))
260 case AUTH_NO_CREDENTIALS:
263 freerdp_set_last_error_if_not(context, FREERDP_ERROR_CONNECT_CANCELLED);
270 return IFCALLRESULT(FALSE, transport->io.TLSConnect, transport);
273static BOOL transport_default_connect_tls(rdpTransport* transport)
277 rdpContext* context = NULL;
278 rdpSettings* settings = NULL;
280 WINPR_ASSERT(transport);
282 context = transport_get_context(transport);
283 WINPR_ASSERT(context);
285 settings = context->settings;
286 WINPR_ASSERT(settings);
288 if (!(tls = freerdp_tls_new(context)))
291 transport->tls = tls;
293 if (transport->GatewayEnabled)
294 transport->layer = TRANSPORT_LAYER_TSG_TLS;
296 transport->layer = TRANSPORT_LAYER_TLS;
298 tls->hostname = settings->ServerHostname;
299 tls->serverName = settings->UserSpecifiedServerName;
300 tls->port = WINPR_ASSERTING_INT_CAST(int32_t, MIN(UINT16_MAX, settings->ServerPort));
305 tls->isGatewayTransport = FALSE;
306 tlsStatus = freerdp_tls_connect(tls, transport->frontBio);
312 freerdp_set_last_error_if_not(context, FREERDP_ERROR_TLS_CONNECT_FAILED);
316 freerdp_set_last_error_if_not(context, FREERDP_ERROR_CONNECT_CANCELLED);
322 transport->frontBio = tls->bio;
331 typedef void (*ssl_cb_t)(
const SSL* ssl,
int type,
int val);
332 ssl_cb_t fkt = transport_ssl_cb;
334 BIO_info_cb* bfkt = WINPR_FUNC_PTR_CAST(fkt, BIO_info_cb*);
335 BIO_callback_ctrl(tls->bio, BIO_CTRL_SET_CALLBACK, bfkt);
336 SSL_set_app_data(tls->ssl, transport);
338 if (!transport->frontBio)
340 WLog_Print(transport->log, WLOG_ERROR,
"unable to prepend a filtering TLS bio");
347BOOL transport_connect_nla(rdpTransport* transport, BOOL earlyUserAuth)
349 rdpContext* context = NULL;
350 rdpSettings* settings = NULL;
355 context = transport_get_context(transport);
356 WINPR_ASSERT(context);
358 settings = context->settings;
359 WINPR_ASSERT(settings);
364 if (!transport_connect_tls(transport))
367 if (!settings->Authentication)
371 rdp->nla = nla_new(context, transport);
376 nla_set_early_user_auth(rdp->nla, earlyUserAuth);
378 transport_set_nla_mode(transport, TRUE);
380 if (settings->AuthenticationServiceClass)
382 if (!nla_set_service_principal(rdp->nla, settings->AuthenticationServiceClass,
387 if (nla_client_begin(rdp->nla) < 0)
389 WLog_Print(transport->log, WLOG_ERROR,
"NLA begin failed");
391 freerdp_set_last_error_if_not(context, FREERDP_ERROR_AUTHENTICATION_FAILED);
393 transport_set_nla_mode(transport, FALSE);
397 return rdp_client_transition_to_state(rdp, CONNECTION_STATE_NLA);
400BOOL transport_connect_rdstls(rdpTransport* transport)
403 rdpRdstls* rdstls = NULL;
404 rdpContext* context = NULL;
406 WINPR_ASSERT(transport);
408 context = transport_get_context(transport);
409 WINPR_ASSERT(context);
411 if (!transport_connect_tls(transport))
414 rdstls = rdstls_new(context, transport);
418 transport_set_rdstls_mode(transport, TRUE);
420 if (rdstls_authenticate(rdstls) < 0)
422 WLog_Print(transport->log, WLOG_ERROR,
"RDSTLS authentication failed");
423 freerdp_set_last_error_if_not(context, FREERDP_ERROR_AUTHENTICATION_FAILED);
427 transport_set_rdstls_mode(transport, FALSE);
434BOOL transport_connect_aad(rdpTransport* transport)
436 rdpContext* context = NULL;
437 rdpSettings* settings = NULL;
442 context = transport_get_context(transport);
443 WINPR_ASSERT(context);
445 settings = context->settings;
446 WINPR_ASSERT(settings);
451 if (!transport_connect_tls(transport))
454 if (!settings->Authentication)
460 transport_set_aad_mode(transport, TRUE);
462 if (aad_client_begin(rdp->aad) < 0)
464 WLog_Print(transport->log, WLOG_ERROR,
"AAD begin failed");
466 freerdp_set_last_error_if_not(context, FREERDP_ERROR_AUTHENTICATION_FAILED);
468 transport_set_aad_mode(transport, FALSE);
472 return rdp_client_transition_to_state(rdp, CONNECTION_STATE_AAD);
475BOOL transport_connect(rdpTransport* transport,
const char* hostname, UINT16 port, DWORD timeout)
478 rdpSettings* settings = NULL;
479 rdpContext* context = transport_get_context(transport);
480 BOOL rpcFallback = 0;
482 WINPR_ASSERT(context);
483 WINPR_ASSERT(hostname);
485 settings = context->settings;
486 WINPR_ASSERT(settings);
488 rpcFallback = !settings->GatewayHttpTransport;
490 if (transport->GatewayEnabled)
492 if (settings->GatewayUrl)
494 WINPR_ASSERT(!transport->wst);
495 transport->wst = wst_new(context);
500 status = wst_connect(transport->wst, timeout);
504 transport->frontBio = wst_get_front_bio_and_take_ownership(transport->wst);
505 WINPR_ASSERT(transport->frontBio);
506 BIO_set_nonblock(transport->frontBio, 0);
507 transport->layer = TRANSPORT_LAYER_TSG;
512 wst_free(transport->wst);
513 transport->wst = NULL;
516 if (!status && settings->GatewayHttpTransport)
518 WINPR_ASSERT(!transport->rdg);
519 transport->rdg = rdg_new(context);
524 status = rdg_connect(transport->rdg, timeout, &rpcFallback);
528 transport->frontBio = rdg_get_front_bio_and_take_ownership(transport->rdg);
529 WINPR_ASSERT(transport->frontBio);
530 BIO_set_nonblock(transport->frontBio, 0);
531 transport->layer = TRANSPORT_LAYER_TSG;
536 rdg_free(transport->rdg);
537 transport->rdg = NULL;
541 if (!status && settings->GatewayRpcTransport && rpcFallback)
543 WINPR_ASSERT(!transport->tsg);
544 transport->tsg = tsg_new(transport);
550 freerdp_set_last_error_log(context, FREERDP_ERROR_SUCCESS);
551 status = tsg_connect(transport->tsg, hostname, port, timeout);
555 transport->frontBio = tsg_get_bio(transport->tsg);
556 transport->layer = TRANSPORT_LAYER_TSG;
561 tsg_free(transport->tsg);
562 transport->tsg = NULL;
569 const char* proxyHostname = NULL;
570 const char* proxyUsername = NULL;
571 const char* proxyPassword = NULL;
572 BOOL isProxyConnection =
573 proxy_prepare(settings, &proxyHostname, &peerPort, &proxyUsername, &proxyPassword);
576 if (isProxyConnection)
577 layer = transport_connect_layer(transport, proxyHostname, peerPort, timeout);
579 layer = transport_connect_layer(transport, hostname, port, timeout);
584 if (!transport_attach_layer(transport, layer))
586 transport_layer_free(layer);
590 if (isProxyConnection)
592 if (!proxy_connect(context, transport->frontBio, proxyUsername, proxyPassword, hostname,
603BOOL transport_connect_childsession(rdpTransport* transport)
605 WINPR_ASSERT(transport);
607 transport->frontBio = createChildSessionBio();
608 if (!transport->frontBio)
611 transport->layer = TRANSPORT_LAYER_TSG;
615BOOL transport_accept_rdp(rdpTransport* transport)
623BOOL transport_accept_tls(rdpTransport* transport)
627 return IFCALLRESULT(FALSE, transport->io.TLSAccept, transport);
630static BOOL transport_default_accept_tls(rdpTransport* transport)
632 rdpContext* context = transport_get_context(transport);
633 rdpSettings* settings = NULL;
635 WINPR_ASSERT(context);
637 settings = context->settings;
638 WINPR_ASSERT(settings);
641 transport->tls = freerdp_tls_new(context);
643 transport->layer = TRANSPORT_LAYER_TLS;
645 if (!freerdp_tls_accept(transport->tls, transport->frontBio, settings))
648 transport->frontBio = transport->tls->bio;
652BOOL transport_accept_nla(rdpTransport* transport)
654 rdpContext* context = transport_get_context(transport);
655 rdpSettings* settings = NULL;
657 WINPR_ASSERT(context);
659 settings = context->settings;
660 WINPR_ASSERT(settings);
662 if (!IFCALLRESULT(FALSE, transport->io.TLSAccept, transport))
667 if (!settings->Authentication)
672 transport->nla = nla_new(context, transport);
673 transport_set_nla_mode(transport, TRUE);
676 if (nla_authenticate(transport->nla) < 0)
678 WLog_Print(transport->log, WLOG_ERROR,
"client authentication failure");
679 transport_set_nla_mode(transport, FALSE);
680 nla_free(transport->nla);
681 transport->nla = NULL;
682 freerdp_tls_set_alert_code(transport->tls, TLS_ALERT_LEVEL_FATAL,
683 TLS_ALERT_DESCRIPTION_ACCESS_DENIED);
684 freerdp_tls_send_alert(transport->tls);
689 transport_set_nla_mode(transport, FALSE);
693BOOL transport_accept_rdstls(rdpTransport* transport)
696 rdpRdstls* rdstls = NULL;
697 rdpContext* context = NULL;
699 WINPR_ASSERT(transport);
701 context = transport_get_context(transport);
702 WINPR_ASSERT(context);
704 if (!IFCALLRESULT(FALSE, transport->io.TLSAccept, transport))
707 rdstls = rdstls_new(context, transport);
711 transport_set_rdstls_mode(transport, TRUE);
713 if (rdstls_authenticate(rdstls) < 0)
715 WLog_Print(transport->log, WLOG_ERROR,
"client authentication failure");
716 freerdp_tls_set_alert_code(transport->tls, TLS_ALERT_LEVEL_FATAL,
717 TLS_ALERT_DESCRIPTION_ACCESS_DENIED);
718 freerdp_tls_send_alert(transport->tls);
722 transport_set_rdstls_mode(transport, FALSE);
729#define WLog_ERR_BIO(transport, biofunc, bio) \
730 transport_bio_error_log(transport, biofunc, bio, __FILE__, __func__, __LINE__)
732static void transport_bio_error_log(rdpTransport* transport, LPCSTR biofunc,
733 WINPR_ATTR_UNUSED BIO* bio, LPCSTR file, LPCSTR func,
736 unsigned long sslerr = 0;
740 WINPR_ASSERT(transport);
745 if (level < WLog_GetLogLevel(transport->log))
748 if (ERR_peek_error() == 0)
750 char ebuffer[256] = { 0 };
751 const char* fmt =
"%s returned a system error %d: %s";
753 fmt =
"%s retries exceeded";
754 WLog_PrintMessage(transport->log, WLOG_MESSAGE_TEXT, level, line, file, func, fmt, biofunc,
755 saveerrno, winpr_strerror(saveerrno, ebuffer,
sizeof(ebuffer)));
759 while ((sslerr = ERR_get_error()))
761 char buf[120] = { 0 };
762 const char* fmt =
"%s returned an error: %s";
764 ERR_error_string_n(sslerr, buf, 120);
765 WLog_PrintMessage(transport->log, WLOG_MESSAGE_TEXT, level, line, file, func, fmt, biofunc,
770static SSIZE_T transport_read_layer(rdpTransport* transport, BYTE* data,
size_t bytes)
774 rdpContext* context = NULL;
776 WINPR_ASSERT(transport);
778 context = transport_get_context(transport);
779 WINPR_ASSERT(context);
784 if (!transport->frontBio || (bytes > SSIZE_MAX))
786 transport->layer = TRANSPORT_LAYER_CLOSED;
787 freerdp_set_last_error_if_not(context, FREERDP_ERROR_CONNECT_TRANSPORT_FAILED);
791 while (read < (SSIZE_T)bytes)
793 const SSIZE_T tr = (SSIZE_T)bytes - read;
794 int r = (int)((tr > INT_MAX) ? INT_MAX : tr);
796 int status = BIO_read(transport->frontBio, data + read, r);
798 if (freerdp_shall_disconnect_context(context))
803 if (!transport->frontBio || !BIO_should_retry(transport->frontBio))
806 if (!transport->frontBio)
808 WLog_Print(transport->log, WLOG_ERROR,
"BIO_read: transport->frontBio null");
812 WLog_ERR_BIO(transport,
"BIO_read", transport->frontBio);
813 transport->layer = TRANSPORT_LAYER_CLOSED;
814 freerdp_set_last_error_if_not(context, FREERDP_ERROR_CONNECT_TRANSPORT_FAILED);
819 if (!transport->blocking)
824 if (BIO_wait_read(transport->frontBio, 100) < 0)
826 WLog_ERR_BIO(transport,
"BIO_wait_read", transport->frontBio);
833#ifdef FREERDP_HAVE_VALGRIND_MEMCHECK_H
834 VALGRIND_MAKE_MEM_DEFINED(data + read, bytes - read);
837 rdp->inBytes += WINPR_ASSERTING_INT_CAST(uint64_t, status);
857static SSIZE_T transport_read_layer_bytes(rdpTransport* transport,
wStream* s,
size_t toRead)
863 if (toRead > SSIZE_MAX)
866 status = IFCALLRESULT(-1, transport->io.ReadBytes, transport, Stream_Pointer(s), toRead);
871 Stream_Seek(s, (
size_t)status);
872 return status == (SSIZE_T)toRead ? 1 : 0;
887int transport_read_pdu(rdpTransport* transport,
wStream* s)
891 return IFCALLRESULT(-1, transport->io.ReadPdu, transport, s);
894static SSIZE_T parse_nla_mode_pdu(rdpTransport* transport,
wStream* stream)
896 SSIZE_T pduLength = 0;
898 wStream* s = Stream_StaticConstInit(&sbuffer, Stream_Buffer(stream), Stream_Length(stream));
905 UINT8 typeEncoding = 0;
906 if (Stream_GetRemainingLength(s) < 1)
908 Stream_Read_UINT8(s, typeEncoding);
909 if (typeEncoding == 0x30)
912 UINT8 lengthEncoding = 0;
913 if (Stream_GetRemainingLength(s) < 1)
915 Stream_Read_UINT8(s, lengthEncoding);
916 if (lengthEncoding & 0x80)
918 if ((lengthEncoding & ~(0x80)) == 1)
921 if (Stream_GetRemainingLength(s) < 1)
923 Stream_Read_UINT8(s, length);
927 else if ((lengthEncoding & ~(0x80)) == 2)
931 if (Stream_GetRemainingLength(s) < 2)
933 Stream_Read_UINT16_BE(s, length);
939 WLog_Print(transport->log, WLOG_ERROR,
"Error reading TSRequest!");
945 pduLength = lengthEncoding;
953static SSIZE_T parse_default_mode_pdu(rdpTransport* transport,
wStream* stream)
955 SSIZE_T pduLength = 0;
957 wStream* s = Stream_StaticConstInit(&sbuffer, Stream_Buffer(stream), Stream_Length(stream));
960 if (Stream_GetRemainingLength(s) < 1)
962 Stream_Read_UINT8(s, version);
967 if (Stream_GetRemainingLength(s) < 3)
970 Stream_Read_UINT16_BE(s, length);
974 if ((pduLength < 7) || (pduLength > 0xFFFF))
976 WLog_Print(transport->log, WLOG_ERROR,
"tpkt - invalid pduLength: %" PRIdz, pduLength);
984 if (Stream_GetRemainingLength(s) < 1)
986 Stream_Read_UINT8(s, length1);
990 if (Stream_GetRemainingLength(s) < 1)
992 Stream_Read_UINT8(s, length2);
993 pduLength = ((length1 & 0x7F) << 8) | length2;
1003 if (pduLength < 3 || pduLength > 0x8000)
1005 WLog_Print(transport->log, WLOG_ERROR,
"fast path - invalid pduLength: %" PRIdz,
1014SSIZE_T transport_parse_pdu(rdpTransport* transport,
wStream* s, BOOL* incomplete)
1016 SSIZE_T pduLength = 0;
1027 Stream_SealLength(s);
1028 if (transport->NlaMode)
1029 pduLength = parse_nla_mode_pdu(transport, s);
1030 else if (transport->RdstlsMode)
1031 pduLength = rdstls_parse_pdu(transport->log, s);
1033 pduLength = parse_default_mode_pdu(transport, s);
1038 const size_t len = Stream_Length(s);
1039 if (len > WINPR_ASSERTING_INT_CAST(
size_t, pduLength))
1043 *incomplete = len < WINPR_ASSERTING_INT_CAST(
size_t, pduLength);
1048static int transport_default_read_pdu(rdpTransport* transport,
wStream* s)
1050 BOOL incomplete = 0;
1052 size_t pduLength = 0;
1053 size_t position = 0;
1055 WINPR_ASSERT(transport);
1060 if (transport->AadMode)
1065 const SSIZE_T rc = transport_read_layer(transport, &c, 1);
1067 return (rc == 0) ? 0 : -1;
1068 if (!Stream_EnsureRemainingCapacity(s, 1))
1070 Stream_Write_UINT8(s, c);
1071 }
while (c !=
'\0');
1073 else if (transport->earlyUserAuth)
1075 if (!Stream_EnsureCapacity(s, 4))
1077 const SSIZE_T rc = transport_read_layer_bytes(transport, s, 4);
1079 return (rc == 0) ? 0 : -1;
1084 status = transport_parse_pdu(transport, s, &incomplete);
1085 while ((status == 0) && incomplete)
1087 if (!Stream_EnsureRemainingCapacity(s, 1))
1089 SSIZE_T rc = transport_read_layer_bytes(transport, s, 1);
1094 status = transport_parse_pdu(transport, s, &incomplete);
1100 pduLength = (size_t)status;
1103 if (!Stream_EnsureCapacity(s, pduLength))
1106 position = Stream_GetPosition(s);
1107 if (position > pduLength)
1109 else if (position < pduLength)
1111 status = transport_read_layer_bytes(transport, s, pduLength - position);
1114 if ((status < INT32_MIN) || (status > INT32_MAX))
1120 if (Stream_GetPosition(s) >= pduLength)
1121 WLog_Packet(transport->log, WLOG_TRACE, Stream_Buffer(s), pduLength,
1122 WLOG_PACKET_INBOUND);
1125 Stream_SealLength(s);
1126 Stream_SetPosition(s, 0);
1127 const size_t len = Stream_Length(s);
1128 if (len > INT32_MAX)
1133int transport_write(rdpTransport* transport,
wStream* s)
1138 return IFCALLRESULT(-1, transport->io.WritePdu, transport, s);
1141static int transport_default_write(rdpTransport* transport,
wStream* s)
1144 rdpContext* context = transport_get_context(transport);
1146 WINPR_ASSERT(transport);
1147 WINPR_ASSERT(context);
1154 rdpRdp* rdp = context->rdp;
1158 EnterCriticalSection(&(transport->WriteLock));
1159 if (!transport->frontBio)
1162 size_t length = Stream_GetPosition(s);
1163 size_t writtenlength = length;
1164 Stream_SetPosition(s, 0);
1168 rdp->outBytes += length;
1169 WLog_Packet(transport->log, WLOG_TRACE, Stream_Buffer(s), length, WLOG_PACKET_OUTBOUND);
1175 const int towrite = (length > INT32_MAX) ? INT32_MAX : (int)length;
1176 status = BIO_write(transport->frontBio, Stream_ConstPointer(s), towrite);
1184 if (!BIO_should_retry(transport->frontBio))
1186 WLog_ERR_BIO(transport,
"BIO_should_retry", transport->frontBio);
1191 if (!transport->blocking)
1193 WLog_ERR_BIO(transport,
"BIO_write", transport->frontBio);
1197 if (BIO_wait_write(transport->frontBio, 100) < 0)
1199 WLog_ERR_BIO(transport,
"BIO_wait_write", transport->frontBio);
1207 WINPR_ASSERT(context->settings);
1208 if (transport->blocking || context->settings->WaitForOutputBufferFlush)
1210 while (BIO_write_blocked(transport->frontBio))
1212 if (BIO_wait_write(transport->frontBio, 100) < 0)
1214 WLog_Print(transport->log, WLOG_ERROR,
"error when selecting for write");
1219 if (BIO_flush(transport->frontBio) < 1)
1221 WLog_Print(transport->log, WLOG_ERROR,
"error when flushing outputBuffer");
1228 const size_t ustatus = (size_t)status;
1229 if (ustatus > length)
1236 Stream_Seek(s, ustatus);
1239 transport->written += writtenlength;
1245 transport->layer = TRANSPORT_LAYER_CLOSED;
1246 freerdp_set_last_error_if_not(context, FREERDP_ERROR_CONNECT_TRANSPORT_FAILED);
1249 LeaveCriticalSection(&(transport->WriteLock));
1255BOOL transport_get_public_key(rdpTransport* transport,
const BYTE** data, DWORD* length)
1257 return IFCALLRESULT(FALSE, transport->io.GetPublicKey, transport, data, length);
1260static BOOL transport_default_get_public_key(rdpTransport* transport,
const BYTE** data,
1263 rdpTls* tls = transport_get_tls(transport);
1267 *data = tls->PublicKey;
1268 *length = tls->PublicKeyLength;
1273DWORD transport_get_event_handles(rdpTransport* transport, HANDLE* events, DWORD count)
1277 WINPR_ASSERT(transport);
1278 WINPR_ASSERT(events);
1279 WINPR_ASSERT(count > 0);
1285 WLog_Print(transport->log, WLOG_ERROR,
"provided handles array is too small");
1289 events[nCount++] = transport->rereadEvent;
1291 if (transport->useIoEvent)
1295 events[nCount++] = transport->ioEvent;
1299 if (!transport->GatewayEnabled)
1303 if (nCount >= count)
1305 WLog_Print(transport->log, WLOG_ERROR,
1306 "provided handles array is too small (count=%" PRIu32
" nCount=%" PRIu32
1312 if (transport->frontBio)
1314 if (BIO_get_event(transport->frontBio, &events[nCount]) != 1)
1316 WLog_Print(transport->log, WLOG_ERROR,
"error getting the frontBio handle");
1328 rdg_get_event_handles(transport->rdg, &events[nCount], count - nCount);
1335 else if (transport->tsg)
1338 tsg_get_event_handles(transport->tsg, &events[nCount], count - nCount);
1345 else if (transport->wst)
1348 wst_get_event_handles(transport->wst, &events[nCount], count - nCount);
1360#if defined(WITH_FREERDP_DEPRECATED)
1361void transport_get_fds(rdpTransport* transport,
void** rfds,
int* rcount)
1364 HANDLE events[MAXIMUM_WAIT_OBJECTS] = { 0 };
1366 WINPR_ASSERT(transport);
1368 WINPR_ASSERT(rcount);
1370 nCount = transport_get_event_handles(transport, events, ARRAYSIZE(events));
1371 *rcount = nCount + 1;
1373 for (DWORD index = 0; index < nCount; index++)
1375 rfds[index] = GetEventWaitObject(events[index]);
1378 rfds[nCount] = GetEventWaitObject(transport->rereadEvent);
1382BOOL transport_is_write_blocked(rdpTransport* transport)
1384 WINPR_ASSERT(transport);
1385 WINPR_ASSERT(transport->frontBio);
1386 return BIO_write_blocked(transport->frontBio) != 0;
1389int transport_drain_output_buffer(rdpTransport* transport)
1391 BOOL status = FALSE;
1393 WINPR_ASSERT(transport);
1394 WINPR_ASSERT(transport->frontBio);
1395 if (BIO_write_blocked(transport->frontBio))
1397 if (BIO_flush(transport->frontBio) < 1)
1400 const long rc = BIO_write_blocked(transport->frontBio);
1407int transport_check_fds(rdpTransport* transport)
1410 state_run_t recv_status = STATE_RUN_FAILED;
1412 rdpContext* context = transport_get_context(transport);
1414 WINPR_ASSERT(context);
1416 if (transport->layer == TRANSPORT_LAYER_CLOSED)
1418 WLog_Print(transport->log, WLOG_DEBUG,
"transport_check_fds: transport layer closed");
1419 freerdp_set_last_error_if_not(context, FREERDP_ERROR_CONNECT_TRANSPORT_FAILED);
1432 if ((status = transport_read_pdu(transport, transport->ReceiveBuffer)) <= 0)
1435 WLog_Print(transport->log, WLOG_DEBUG,
"transport_check_fds: transport_read_pdu() - %i",
1437 if (transport->haveMoreBytesToRead)
1439 transport->haveMoreBytesToRead = FALSE;
1440 (void)ResetEvent(transport->rereadEvent);
1445 received = transport->ReceiveBuffer;
1446 transport->ReceiveBuffer = StreamPool_Take(transport->ReceivePool, 0);
1447 if (!transport->ReceiveBuffer)
1449 Stream_Release(received);
1459 WINPR_ASSERT(transport->ReceiveCallback);
1460 recv_status = transport->ReceiveCallback(transport, received, transport->ReceiveExtra);
1461 Stream_Release(received);
1463 if (state_run_failed(recv_status))
1465 char buffer[64] = { 0 };
1466 WLog_Print(transport->log, WLOG_ERROR,
1467 "transport_check_fds: transport->ReceiveCallback() - %s",
1468 state_run_result_string(recv_status, buffer, ARRAYSIZE(buffer)));
1475 if (!transport->haveMoreBytesToRead)
1477 transport->haveMoreBytesToRead = TRUE;
1478 (void)SetEvent(transport->rereadEvent);
1483BOOL transport_set_blocking_mode(rdpTransport* transport, BOOL blocking)
1485 WINPR_ASSERT(transport);
1487 return IFCALLRESULT(FALSE, transport->io.SetBlockingMode, transport, blocking);
1490static BOOL transport_default_set_blocking_mode(rdpTransport* transport, BOOL blocking)
1492 WINPR_ASSERT(transport);
1494 transport->blocking = blocking;
1496 if (transport->frontBio)
1498 if (!BIO_set_nonblock(transport->frontBio, blocking ? FALSE : TRUE))
1505rdpTransportLayer* transport_connect_layer(rdpTransport* transport,
const char* hostname,
int port,
1508 WINPR_ASSERT(transport);
1510 return IFCALLRESULT(NULL, transport->io.ConnectLayer, transport, hostname, port, timeout);
1513static rdpTransportLayer* transport_default_connect_layer(rdpTransport* transport,
1514 const char* hostname,
int port,
1517 rdpContext* context = transport_get_context(transport);
1518 WINPR_ASSERT(context);
1520 return freerdp_tcp_connect_layer(context, hostname, port, timeout);
1525 WINPR_ASSERT(transport);
1526 WINPR_ASSERT(layer);
1528 return IFCALLRESULT(FALSE, transport->io.AttachLayer, transport, layer);
1531static BOOL transport_default_attach_layer(rdpTransport* transport,
rdpTransportLayer* layer)
1533 BIO* layerBio = BIO_new(BIO_s_transport_layer());
1537 BIO* bufferedBio = BIO_new(BIO_s_buffered_socket());
1541 bufferedBio = BIO_push(bufferedBio, layerBio);
1546 BIO_set_data(layerBio, layer);
1548 transport->frontBio = bufferedBio;
1554 BIO_free_all(layerBio);
1559void transport_set_gateway_enabled(rdpTransport* transport, BOOL GatewayEnabled)
1561 WINPR_ASSERT(transport);
1562 transport->GatewayEnabled = GatewayEnabled;
1565void transport_set_nla_mode(rdpTransport* transport, BOOL NlaMode)
1567 WINPR_ASSERT(transport);
1568 transport->NlaMode = NlaMode;
1571void transport_set_rdstls_mode(rdpTransport* transport, BOOL RdstlsMode)
1573 WINPR_ASSERT(transport);
1574 transport->RdstlsMode = RdstlsMode;
1577void transport_set_aad_mode(rdpTransport* transport, BOOL AadMode)
1579 WINPR_ASSERT(transport);
1580 transport->AadMode = AadMode;
1583BOOL transport_disconnect(rdpTransport* transport)
1587 return IFCALLRESULT(FALSE, transport->io.TransportDisconnect, transport);
1590static BOOL transport_default_disconnect(rdpTransport* transport)
1597 EnterCriticalSection(&(transport->ReadLock));
1598 EnterCriticalSection(&(transport->WriteLock));
1601 freerdp_tls_free(transport->tls);
1602 transport->tls = NULL;
1606 if (transport->frontBio)
1607 BIO_free_all(transport->frontBio);
1612 tsg_free(transport->tsg);
1613 transport->tsg = NULL;
1618 rdg_free(transport->rdg);
1619 transport->rdg = NULL;
1624 wst_free(transport->wst);
1625 transport->wst = NULL;
1628 transport->frontBio = NULL;
1629 transport->layer = TRANSPORT_LAYER_TCP;
1630 transport->earlyUserAuth = FALSE;
1631 LeaveCriticalSection(&(transport->WriteLock));
1632 LeaveCriticalSection(&(transport->ReadLock));
1636rdpTransport* transport_new(rdpContext* context)
1638 rdpTransport* transport = (rdpTransport*)calloc(1,
sizeof(rdpTransport));
1640 WINPR_ASSERT(context);
1644 transport->log = WLog_Get(TAG);
1646 if (!transport->log)
1650 transport->io.TCPConnect = freerdp_tcp_default_connect;
1651 transport->io.TLSConnect = transport_default_connect_tls;
1652 transport->io.TLSAccept = transport_default_accept_tls;
1653 transport->io.TransportAttach = transport_default_attach;
1654 transport->io.TransportDisconnect = transport_default_disconnect;
1655 transport->io.ReadPdu = transport_default_read_pdu;
1656 transport->io.WritePdu = transport_default_write;
1657 transport->io.ReadBytes = transport_read_layer;
1658 transport->io.GetPublicKey = transport_default_get_public_key;
1659 transport->io.SetBlockingMode = transport_default_set_blocking_mode;
1660 transport->io.ConnectLayer = transport_default_connect_layer;
1661 transport->io.AttachLayer = transport_default_attach_layer;
1663 transport->context = context;
1664 transport->ReceivePool = StreamPool_New(TRUE, BUFFER_SIZE);
1666 if (!transport->ReceivePool)
1670 transport->ReceiveBuffer = StreamPool_Take(transport->ReceivePool, 0);
1672 if (!transport->ReceiveBuffer)
1675 transport->connectedEvent = CreateEvent(NULL, TRUE, FALSE, NULL);
1677 if (!transport->connectedEvent || transport->connectedEvent == INVALID_HANDLE_VALUE)
1680 transport->rereadEvent = CreateEvent(NULL, TRUE, FALSE, NULL);
1682 if (!transport->rereadEvent || transport->rereadEvent == INVALID_HANDLE_VALUE)
1685 transport->ioEvent = CreateEvent(NULL, TRUE, FALSE, NULL);
1687 if (!transport->ioEvent || transport->ioEvent == INVALID_HANDLE_VALUE)
1690 transport->haveMoreBytesToRead = FALSE;
1691 transport->blocking = TRUE;
1692 transport->GatewayEnabled = FALSE;
1693 transport->layer = TRANSPORT_LAYER_TCP;
1695 if (!InitializeCriticalSectionAndSpinCount(&(transport->ReadLock), 4000))
1698 if (!InitializeCriticalSectionAndSpinCount(&(transport->WriteLock), 4000))
1703 WINPR_PRAGMA_DIAG_PUSH
1704 WINPR_PRAGMA_DIAG_IGNORED_MISMATCHED_DEALLOC
1705 transport_free(transport);
1706 WINPR_PRAGMA_DIAG_POP
1710void transport_free(rdpTransport* transport)
1715 transport_disconnect(transport);
1717 EnterCriticalSection(&(transport->ReadLock));
1718 if (transport->ReceiveBuffer)
1719 Stream_Release(transport->ReceiveBuffer);
1720 LeaveCriticalSection(&(transport->ReadLock));
1722 (void)StreamPool_WaitForReturn(transport->ReceivePool, INFINITE);
1724 EnterCriticalSection(&(transport->ReadLock));
1725 EnterCriticalSection(&(transport->WriteLock));
1727 nla_free(transport->nla);
1728 StreamPool_Free(transport->ReceivePool);
1729 (void)CloseHandle(transport->connectedEvent);
1730 (void)CloseHandle(transport->rereadEvent);
1731 (void)CloseHandle(transport->ioEvent);
1733 LeaveCriticalSection(&(transport->ReadLock));
1734 DeleteCriticalSection(&(transport->ReadLock));
1736 LeaveCriticalSection(&(transport->WriteLock));
1737 DeleteCriticalSection(&(transport->WriteLock));
1741BOOL transport_set_io_callbacks(rdpTransport* transport,
const rdpTransportIo* io_callbacks)
1743 if (!transport || !io_callbacks)
1746 transport->io = *io_callbacks;
1750const rdpTransportIo* transport_get_io_callbacks(rdpTransport* transport)
1754 return &transport->io;
1757rdpContext* transport_get_context(rdpTransport* transport)
1759 WINPR_ASSERT(transport);
1760 return transport->context;
1763rdpTransport* freerdp_get_transport(rdpContext* context)
1765 WINPR_ASSERT(context);
1766 WINPR_ASSERT(context->rdp);
1767 return context->rdp->transport;
1770BOOL transport_set_nla(rdpTransport* transport, rdpNla* nla)
1772 WINPR_ASSERT(transport);
1773 nla_free(transport->nla);
1774 transport->nla = nla;
1778rdpNla* transport_get_nla(rdpTransport* transport)
1780 WINPR_ASSERT(transport);
1781 return transport->nla;
1784BOOL transport_set_tls(rdpTransport* transport, rdpTls* tls)
1786 WINPR_ASSERT(transport);
1787 freerdp_tls_free(transport->tls);
1788 transport->tls = tls;
1792rdpTls* transport_get_tls(rdpTransport* transport)
1794 WINPR_ASSERT(transport);
1795 return transport->tls;
1798BOOL transport_set_tsg(rdpTransport* transport, rdpTsg* tsg)
1800 WINPR_ASSERT(transport);
1801 tsg_free(transport->tsg);
1802 transport->tsg = tsg;
1806rdpTsg* transport_get_tsg(rdpTransport* transport)
1808 WINPR_ASSERT(transport);
1809 return transport->tsg;
1812wStream* transport_take_from_pool(rdpTransport* transport,
size_t size)
1814 WINPR_ASSERT(transport);
1815 if (!transport->frontBio)
1817 return StreamPool_Take(transport->ReceivePool, size);
1820UINT64 transport_get_bytes_sent(rdpTransport* transport, BOOL resetCount)
1823 WINPR_ASSERT(transport);
1824 rc = transport->written;
1826 transport->written = 0;
1830TRANSPORT_LAYER transport_get_layer(rdpTransport* transport)
1832 WINPR_ASSERT(transport);
1833 return transport->layer;
1836BOOL transport_set_layer(rdpTransport* transport, TRANSPORT_LAYER layer)
1838 WINPR_ASSERT(transport);
1839 transport->layer = layer;
1843BOOL transport_set_connected_event(rdpTransport* transport)
1845 WINPR_ASSERT(transport);
1846 return SetEvent(transport->connectedEvent);
1849BOOL transport_set_recv_callbacks(rdpTransport* transport, TransportRecv recv,
void* extra)
1851 WINPR_ASSERT(transport);
1852 transport->ReceiveCallback = recv;
1853 transport->ReceiveExtra = extra;
1857BOOL transport_get_blocking(rdpTransport* transport)
1859 WINPR_ASSERT(transport);
1860 return transport->blocking;
1863BOOL transport_set_blocking(rdpTransport* transport, BOOL blocking)
1865 WINPR_ASSERT(transport);
1866 transport->blocking = blocking;
1870BOOL transport_have_more_bytes_to_read(rdpTransport* transport)
1872 WINPR_ASSERT(transport);
1873 return transport->haveMoreBytesToRead;
1876int transport_tcp_connect(rdpTransport* transport,
const char* hostname,
int port, DWORD timeout)
1878 rdpContext* context = transport_get_context(transport);
1879 WINPR_ASSERT(context);
1880 WINPR_ASSERT(context->settings);
1881 return IFCALLRESULT(-1, transport->io.TCPConnect, context, context->settings, hostname, port,
1885HANDLE transport_get_front_bio(rdpTransport* transport)
1887 HANDLE hEvent = NULL;
1888 WINPR_ASSERT(transport);
1889 WINPR_ASSERT(transport->frontBio);
1891 BIO_get_event(transport->frontBio, &hEvent);
1895BOOL transport_io_callback_set_event(rdpTransport* transport, BOOL set)
1897 WINPR_ASSERT(transport);
1898 transport->useIoEvent = TRUE;
1900 return ResetEvent(transport->ioEvent);
1901 return SetEvent(transport->ioEvent);
1904void transport_set_early_user_auth_mode(rdpTransport* transport, BOOL EUAMode)
1906 WINPR_ASSERT(transport);
1907 transport->earlyUserAuth = EUAMode;
1908 WLog_Print(transport->log, WLOG_DEBUG,
"Early User Auth Mode: %s", EUAMode ?
"on" :
"off");
1911rdpTransportLayer* transport_layer_new(WINPR_ATTR_UNUSED rdpTransport* transport,
1920 layer->userContext = calloc(1, contextSize);
1921 if (!layer->userContext)
1936 IFCALL(layer->Close, layer->userContext);
1937 free(layer->userContext);
1941static int transport_layer_bio_write(BIO* bio,
const char* buf,
int size)
1954 BIO_clear_flags(bio, BIO_FLAGS_WRITE | BIO_FLAGS_SHOULD_RETRY);
1956 int status = IFCALLRESULT(-1, layer->Write, layer->userContext, buf, size);
1958 if (status >= 0 && status < size)
1959 BIO_set_flags(bio, (BIO_FLAGS_WRITE | BIO_FLAGS_SHOULD_RETRY));
1964static int transport_layer_bio_read(BIO* bio,
char* buf,
int size)
1977 BIO_clear_flags(bio, BIO_FLAGS_READ | BIO_FLAGS_SHOULD_RETRY);
1979 int status = IFCALLRESULT(-1, layer->Read, layer->userContext, buf, size);
1982 BIO_set_flags(bio, (BIO_FLAGS_READ | BIO_FLAGS_SHOULD_RETRY));
1987static int transport_layer_bio_puts(WINPR_ATTR_UNUSED BIO* bio, WINPR_ATTR_UNUSED
const char* str)
1992static int transport_layer_bio_gets(WINPR_ATTR_UNUSED BIO* bio, WINPR_ATTR_UNUSED
char* str,
1993 WINPR_ATTR_UNUSED
int size)
1998static long transport_layer_bio_ctrl(BIO* bio,
int cmd,
long arg1,
void* arg2)
2009 case BIO_C_GET_EVENT:
2010 *((HANDLE*)arg2) = IFCALLRESULT(NULL, layer->GetEvent, layer->userContext);
2014 case BIO_C_SET_NONBLOCK:
2018 case BIO_C_WAIT_READ:
2020 int timeout = (int)arg1;
2021 BOOL r = IFCALLRESULT(FALSE, layer->Wait, layer->userContext, FALSE,
2022 WINPR_ASSERTING_INT_CAST(uint32_t, timeout));
2034 case BIO_C_WAIT_WRITE:
2036 int timeout = (int)arg1;
2037 BOOL r = IFCALLRESULT(FALSE, layer->Wait, layer->userContext, TRUE,
2038 WINPR_ASSERTING_INT_CAST(uint32_t, timeout));
2050 case BIO_CTRL_GET_CLOSE:
2051 status = BIO_get_shutdown(bio);
2054 case BIO_CTRL_SET_CLOSE:
2055 BIO_set_shutdown(bio, (
int)arg1);
2059 case BIO_CTRL_FLUSH:
2072static int transport_layer_bio_new(BIO* bio)
2076 BIO_set_flags(bio, BIO_FLAGS_SHOULD_RETRY);
2077 BIO_set_init(bio, 1);
2081static int transport_layer_bio_free(BIO* bio)
2088 transport_layer_free(layer);
2090 BIO_set_data(bio, NULL);
2091 BIO_set_init(bio, 0);
2092 BIO_set_flags(bio, 0);
2097BIO_METHOD* BIO_s_transport_layer(
void)
2099 static BIO_METHOD* bio_methods = NULL;
2101 if (bio_methods == NULL)
2103 if (!(bio_methods = BIO_meth_new(BIO_TYPE_SIMPLE,
"TransportLayer")))
2106 BIO_meth_set_write(bio_methods, transport_layer_bio_write);
2107 BIO_meth_set_read(bio_methods, transport_layer_bio_read);
2108 BIO_meth_set_puts(bio_methods, transport_layer_bio_puts);
2109 BIO_meth_set_gets(bio_methods, transport_layer_bio_gets);
2110 BIO_meth_set_ctrl(bio_methods, transport_layer_bio_ctrl);
2111 BIO_meth_set_create(bio_methods, transport_layer_bio_new);
2112 BIO_meth_set_destroy(bio_methods, transport_layer_bio_free);
FREERDP_API const char * freerdp_settings_get_server_name(const rdpSettings *settings)
A helper function to return the correct server name.