21#include <freerdp/config.h>
25#include <winpr/assert.h>
27#include <freerdp/freerdp.h>
28#include <freerdp/channels/cliprdr.h>
29#include <freerdp/channels/rdpdr.h>
31#include <freerdp/log.h>
32#define TAG FREERDP_TAG("core.gateway.utils")
36#include "../core/rdp.h"
38BOOL utils_str_copy(
const char* value,
char** dst)
47 (*dst) = _strdup(value);
48 return (*dst) != NULL;
51static BOOL utils_copy_smartcard_settings(
const rdpSettings* settings, rdpSettings* origSettings)
54 origSettings->SmartcardLogon = settings->SmartcardLogon;
55 origSettings->PasswordIsSmartcardPin = settings->PasswordIsSmartcardPin;
56 if (!utils_str_copy(settings->ReaderName, &origSettings->ReaderName))
58 if (!utils_str_copy(settings->CspName, &origSettings->CspName))
60 if (!utils_str_copy(settings->ContainerName, &origSettings->ContainerName))
66auth_status utils_authenticate_gateway(freerdp* instance, rdp_auth_reason reason)
68 rdpSettings* settings = NULL;
69 rdpSettings* origSettings = NULL;
73 WINPR_ASSERT(instance);
74 WINPR_ASSERT(instance->context);
75 WINPR_ASSERT(instance->context->settings);
76 WINPR_ASSERT(instance->context->rdp);
77 WINPR_ASSERT(instance->context->rdp->originalSettings);
79 settings = instance->context->settings;
80 origSettings = instance->context->rdp->originalSettings;
82 if (freerdp_shall_disconnect_context(instance->context))
93 if (!instance->GatewayAuthenticate && !instance->AuthenticateEx)
94 return AUTH_NO_CREDENTIALS;
96 if (!instance->GatewayAuthenticate)
99 instance->AuthenticateEx(instance, &settings->GatewayUsername,
100 &settings->GatewayPassword, &settings->GatewayDomain, reason);
102 return AUTH_CANCELLED;
107 instance->GatewayAuthenticate(instance, &settings->GatewayUsername,
108 &settings->GatewayPassword, &settings->GatewayDomain);
110 return AUTH_CANCELLED;
113 if (utils_str_is_empty(settings->GatewayUsername) ||
114 utils_str_is_empty(settings->GatewayPassword))
115 return AUTH_NO_CREDENTIALS;
117 if (!utils_sync_credentials(settings, FALSE))
121 if (!utils_str_copy(settings->GatewayUsername, &origSettings->GatewayUsername))
123 if (!utils_str_copy(settings->GatewayDomain, &origSettings->GatewayDomain))
125 if (!utils_str_copy(settings->GatewayPassword, &origSettings->GatewayPassword))
127 if (!utils_sync_credentials(origSettings, FALSE))
130 if (!utils_copy_smartcard_settings(settings, origSettings))
136auth_status utils_authenticate(freerdp* instance, rdp_auth_reason reason, BOOL
override)
138 rdpSettings* settings = NULL;
139 rdpSettings* origSettings = NULL;
140 BOOL prompt = !
override;
143 WINPR_ASSERT(instance);
144 WINPR_ASSERT(instance->context);
145 WINPR_ASSERT(instance->context->settings);
146 WINPR_ASSERT(instance->context->rdp);
147 WINPR_ASSERT(instance->context->rdp->originalSettings);
149 settings = instance->context->settings;
150 origSettings = instance->context->rdp->originalSettings;
152 if (freerdp_shall_disconnect_context(instance->context))
155 if (settings->ConnectChildSession)
156 return AUTH_NO_CREDENTIALS;
160 (settings->Password == NULL && settings->RedirectionPassword == NULL))
170 if (settings->SmartcardLogon)
172 if (!utils_str_is_empty(settings->Password))
174 WLog_INFO(TAG,
"Authentication via smartcard");
177 reason = AUTH_SMARTCARD_PIN;
181 if (settings->SmartcardLogon)
182 reason = AUTH_SMARTCARD_PIN;
189 if (!instance->Authenticate && !instance->AuthenticateEx)
190 return AUTH_NO_CREDENTIALS;
192 if (!instance->Authenticate)
194 proceed = instance->AuthenticateEx(instance, &settings->Username, &settings->Password,
195 &settings->Domain, reason);
197 return AUTH_CANCELLED;
201 proceed = instance->Authenticate(instance, &settings->Username, &settings->Password,
204 return AUTH_NO_CREDENTIALS;
207 if (utils_str_is_empty(settings->Username) || utils_str_is_empty(settings->Password))
208 return AUTH_NO_CREDENTIALS;
210 if (!utils_sync_credentials(settings, TRUE))
214 if (!utils_str_copy(settings->Username, &origSettings->Username))
216 if (!utils_str_copy(settings->Domain, &origSettings->Domain))
218 if (!utils_str_copy(settings->Password, &origSettings->Password))
220 if (!utils_sync_credentials(origSettings, TRUE))
223 if (!utils_copy_smartcard_settings(settings, origSettings))
229BOOL utils_sync_credentials(rdpSettings* settings, BOOL toGateway)
231 WINPR_ASSERT(settings);
232 if (!settings->GatewayUseSameCredentials)
237 if (!utils_str_copy(settings->Username, &settings->GatewayUsername))
239 if (!utils_str_copy(settings->Domain, &settings->GatewayDomain))
241 if (!utils_str_copy(settings->Password, &settings->GatewayPassword))
246 if (!utils_str_copy(settings->GatewayUsername, &settings->Username))
248 if (!utils_str_copy(settings->GatewayDomain, &settings->Domain))
250 if (!utils_str_copy(settings->GatewayPassword, &settings->Password))
256BOOL utils_persist_credentials(rdpSettings* settings,
const rdpSettings* current)
258 if (!settings || !current)
261 const SSIZE_T keys[] = { FreeRDP_GatewayUsername, FreeRDP_GatewayDomain,
262 FreeRDP_GatewayPassword, FreeRDP_Username,
263 FreeRDP_Domain, FreeRDP_Password };
265 for (
size_t x = 0; x < ARRAYSIZE(keys); x++)
267 const SSIZE_T key = keys[x];
270 WLog_ERR(TAG,
"Failed to copy %s from current to backup settings",
279BOOL utils_str_is_empty(
const char* str)
288BOOL utils_abort_connect(rdpRdp* rdp)
293 return SetEvent(rdp->abortEvent);
296BOOL utils_reset_abort(rdpRdp* rdp)
300 return ResetEvent(rdp->abortEvent);
303HANDLE utils_get_abort_event(rdpRdp* rdp)
306 return rdp->abortEvent;
309BOOL utils_abort_event_is_set(
const rdpRdp* rdp)
313 status = WaitForSingleObject(rdp->abortEvent, 0);
314 return status == WAIT_OBJECT_0;
317const char* utils_is_vsock(
const char* hostname)
322 const char vsock[8] =
"vsock://";
323 if (strncmp(hostname, vsock,
sizeof(vsock)) == 0)
324 return &hostname[
sizeof(vsock)];
328static BOOL remove_rdpdr_type(rdpSettings* settings, UINT32 type)
333 printer = freerdp_device_collection_find_type(settings, type);
335 freerdp_device_free(printer);
340static BOOL disable_clipboard(rdpSettings* settings)
344 freerdp_static_channel_collection_del(settings, CLIPRDR_SVC_CHANNEL_NAME);
348static BOOL disable_drive(rdpSettings* settings)
355 return remove_rdpdr_type(settings, RDPDR_DTYP_FILESYSTEM);
358static BOOL disable_printers(rdpSettings* settings)
363 return remove_rdpdr_type(settings, RDPDR_DTYP_PRINT);
366static BOOL disable_port(rdpSettings* settings)
372 if (!remove_rdpdr_type(settings, RDPDR_DTYP_SERIAL))
374 return remove_rdpdr_type(settings, RDPDR_DTYP_PARALLEL);
377static BOOL disable_pnp(WINPR_ATTR_UNUSED rdpSettings* settings)
383static BOOL apply_gw_policy(rdpContext* context)
385 WINPR_ASSERT(context);
386 return utils_reload_channels(context);
389BOOL utils_apply_gateway_policy(wLog* log, rdpContext* context, UINT32 flags,
const char* module)
392 WINPR_ASSERT(context);
394 rdpSettings* settings = context->settings;
395 WINPR_ASSERT(settings);
397 if (flags & HTTP_TUNNEL_REDIR_ENABLE_ALL)
399 WLog_Print(log, WLOG_DEBUG,
"[%s] policy allows all redirections", module);
403 char buffer[128] = { 0 };
404 WLog_Print(log, WLOG_INFO,
"[%s] policy ignored on user request %s", module,
405 utils_redir_flags_to_string(flags, buffer,
sizeof(buffer)));
407 else if (flags & HTTP_TUNNEL_REDIR_DISABLE_ALL)
409 WLog_Print(log, WLOG_INFO,
"[%s] policy denies all redirections", module);
410 if (!disable_drive(settings))
412 if (!disable_printers(settings))
414 if (!disable_clipboard(settings))
416 if (!disable_port(settings))
418 if (!disable_pnp(settings))
420 if (!apply_gw_policy(context))
425 if (flags & HTTP_TUNNEL_REDIR_DISABLE_DRIVE)
427 WLog_Print(log, WLOG_INFO,
"[%s] policy denies drive redirections", module);
428 if (!disable_drive(settings))
431 if (flags & HTTP_TUNNEL_REDIR_DISABLE_PRINTER)
433 WLog_Print(log, WLOG_INFO,
"[%s] policy denies printer redirections", module);
434 if (!disable_printers(settings))
437 if (flags & HTTP_TUNNEL_REDIR_DISABLE_PORT)
439 WLog_Print(log, WLOG_INFO,
"[%s] policy denies port redirections", module);
440 if (!disable_port(settings))
443 if (flags & HTTP_TUNNEL_REDIR_DISABLE_CLIPBOARD)
445 WLog_Print(log, WLOG_INFO,
"[%s] policy denies clipboard redirections", module);
446 if (!disable_clipboard(settings))
449 if (flags & HTTP_TUNNEL_REDIR_DISABLE_PNP)
451 WLog_Print(log, WLOG_INFO,
"[%s] policy denies PNP redirections", module);
452 if (!disable_pnp(settings))
457 if (!apply_gw_policy(context))
464char* utils_redir_flags_to_string(UINT32 flags,
char* buffer,
size_t size)
466 winpr_str_append(
"{", buffer, size,
"");
467 if (flags & HTTP_TUNNEL_REDIR_ENABLE_ALL)
468 winpr_str_append(
"ENABLE_ALL", buffer, size,
"|");
469 if (flags & HTTP_TUNNEL_REDIR_DISABLE_ALL)
470 winpr_str_append(
"DISABLE_ALL", buffer, size,
"|");
471 if (flags & HTTP_TUNNEL_REDIR_DISABLE_DRIVE)
472 winpr_str_append(
"DISABLE_DRIVE", buffer, size,
"|");
473 if (flags & HTTP_TUNNEL_REDIR_DISABLE_PRINTER)
474 winpr_str_append(
"DISABLE_PRINTER", buffer, size,
"|");
475 if (flags & HTTP_TUNNEL_REDIR_DISABLE_PORT)
476 winpr_str_append(
"DISABLE_PORT", buffer, size,
"|");
477 if (flags & HTTP_TUNNEL_REDIR_DISABLE_CLIPBOARD)
478 winpr_str_append(
"DISABLE_CLIPBOARD", buffer, size,
"|");
479 if (flags & HTTP_TUNNEL_REDIR_DISABLE_PNP)
480 winpr_str_append(
"DISABLE_PNP", buffer, size,
"|");
482 char fbuffer[16] = { 0 };
483 (void)_snprintf(fbuffer,
sizeof(fbuffer),
"[0x%08" PRIx32
"]", flags);
485 winpr_str_append(fbuffer, buffer, size,
" ");
486 winpr_str_append(
"{", buffer, size,
"}");
490BOOL utils_reload_channels(rdpContext* context)
492 WINPR_ASSERT(context);
494 freerdp_channels_disconnect(context->channels, context->instance);
495 freerdp_channels_close(context->channels, context->instance);
496 freerdp_channels_free(context->channels);
497 context->channels = freerdp_channels_new(context->instance);
498 WINPR_ASSERT(context->channels);
499 freerdp_channels_register_instance(context->channels, context->instance);
502 IFCALLRET(context->instance->LoadChannels, rc, context->instance);
504 return freerdp_channels_pre_connect(context->channels, context->instance) == CHANNEL_RC_OK;
FREERDP_API BOOL freerdp_settings_get_bool(const rdpSettings *settings, FreeRDP_Settings_Keys_Bool id)
Returns a boolean settings value.
FREERDP_API BOOL freerdp_settings_copy_item(rdpSettings *dst, const rdpSettings *src, SSIZE_T id)
copies one setting identified by id from src to dst
FREERDP_API BOOL freerdp_device_collection_del(rdpSettings *settings, const RDPDR_DEVICE *device)
Removed a device from the settings, returns ownership of the allocated device to caller.
FREERDP_API const char * freerdp_settings_get_name_for_key(SSIZE_T key)
Returns the type name for a key.
FREERDP_API const char * freerdp_settings_get_string(const rdpSettings *settings, FreeRDP_Settings_Keys_String id)
Returns a immutable string settings value.
FREERDP_API BOOL freerdp_settings_set_bool(rdpSettings *settings, FreeRDP_Settings_Keys_Bool id, BOOL param)
Sets a BOOL settings value.