21#include <freerdp/config.h>
25#include <winpr/assert.h>
27#include <freerdp/freerdp.h>
28#include <freerdp/channels/cliprdr.h>
29#include <freerdp/channels/rdpdr.h>
31#include <freerdp/log.h>
32#define TAG FREERDP_TAG("core.gateway.utils")
36#include "../core/rdp.h"
38BOOL utils_str_copy(
const char* value,
char** dst)
47 (*dst) = _strdup(value);
48 return (*dst) !=
nullptr;
51static BOOL utils_copy_smartcard_settings(
const rdpSettings* settings, rdpSettings* origSettings)
54 origSettings->SmartcardLogon = settings->SmartcardLogon;
55 origSettings->PasswordIsSmartcardPin = settings->PasswordIsSmartcardPin;
56 if (!utils_str_copy(settings->ReaderName, &origSettings->ReaderName))
58 if (!utils_str_copy(settings->CspName, &origSettings->CspName))
60 if (!utils_str_copy(settings->ContainerName, &origSettings->ContainerName))
66auth_status utils_authenticate_gateway(freerdp* instance, rdp_auth_reason reason)
68 rdpSettings* settings =
nullptr;
69 rdpSettings* origSettings =
nullptr;
73 WINPR_ASSERT(instance);
74 WINPR_ASSERT(instance->context);
75 WINPR_ASSERT(instance->context->settings);
76 WINPR_ASSERT(instance->context->rdp);
77 WINPR_ASSERT(instance->context->rdp->originalSettings);
79 settings = instance->context->settings;
80 origSettings = instance->context->rdp->originalSettings;
82 if (freerdp_shall_disconnect_context(instance->context))
92 if (!utils_sync_credentials(settings, FALSE))
97#if !defined(WITH_FREERDP_DEPRECATED)
98 if (!instance->AuthenticateEx)
99 return AUTH_NO_CREDENTIALS;
101 if (!instance->GatewayAuthenticate && !instance->AuthenticateEx)
102 return AUTH_NO_CREDENTIALS;
104 if (!instance->GatewayAuthenticate)
108 instance->AuthenticateEx(instance, &settings->GatewayUsername,
109 &settings->GatewayPassword, &settings->GatewayDomain, reason);
111 return AUTH_CANCELLED;
113#if defined(WITH_FREERDP_DEPRECATED)
117 instance->GatewayAuthenticate(instance, &settings->GatewayUsername,
118 &settings->GatewayPassword, &settings->GatewayDomain);
120 return AUTH_CANCELLED;
124 if (utils_str_is_empty(settings->GatewayUsername) ||
125 utils_str_is_empty(settings->GatewayPassword))
126 return AUTH_NO_CREDENTIALS;
128 if (!utils_sync_credentials(settings, FALSE))
132 if (!utils_str_copy(settings->GatewayUsername, &origSettings->GatewayUsername))
134 if (!utils_str_copy(settings->GatewayDomain, &origSettings->GatewayDomain))
136 if (!utils_str_copy(settings->GatewayPassword, &origSettings->GatewayPassword))
138 if (!utils_sync_credentials(origSettings, FALSE))
141 if (!utils_copy_smartcard_settings(settings, origSettings))
147auth_status utils_authenticate(freerdp* instance, rdp_auth_reason reason, BOOL
override)
149 rdpSettings* settings =
nullptr;
150 rdpSettings* origSettings =
nullptr;
151 BOOL prompt = !
override;
154 WINPR_ASSERT(instance);
155 WINPR_ASSERT(instance->context);
156 WINPR_ASSERT(instance->context->settings);
157 WINPR_ASSERT(instance->context->rdp);
158 WINPR_ASSERT(instance->context->rdp->originalSettings);
160 settings = instance->context->settings;
161 origSettings = instance->context->rdp->originalSettings;
163 if (freerdp_shall_disconnect_context(instance->context))
166 if (settings->ConnectChildSession)
167 return AUTH_NO_CREDENTIALS;
171 (settings->Password ==
nullptr && settings->RedirectionPassword ==
nullptr))
181 if (settings->SmartcardLogon)
183 if (!utils_str_is_empty(settings->Password))
185 WLog_INFO(TAG,
"Authentication via smartcard");
188 reason = AUTH_SMARTCARD_PIN;
192 if (settings->SmartcardLogon)
193 reason = AUTH_SMARTCARD_PIN;
201#if !defined(WITH_FREERDP_DEPRECATED)
202 if (!instance->AuthenticateEx)
203 return AUTH_NO_CREDENTIALS;
205 if (!instance->Authenticate && !instance->AuthenticateEx)
206 return AUTH_NO_CREDENTIALS;
207 if (!instance->Authenticate)
210 proceed = instance->AuthenticateEx(instance, &settings->Username, &settings->Password,
211 &settings->Domain, reason);
213 return AUTH_CANCELLED;
215#if defined(WITH_FREERDP_DEPRECATED)
218 proceed = instance->Authenticate(instance, &settings->Username, &settings->Password,
221 return AUTH_NO_CREDENTIALS;
225 if (utils_str_is_empty(settings->Username) || utils_str_is_empty(settings->Password))
226 return AUTH_NO_CREDENTIALS;
228 if (!utils_sync_credentials(settings, TRUE))
232 if (!utils_str_copy(settings->Username, &origSettings->Username))
234 if (!utils_str_copy(settings->Domain, &origSettings->Domain))
236 if (!utils_str_copy(settings->Password, &origSettings->Password))
238 if (!utils_sync_credentials(origSettings, TRUE))
241 if (!utils_copy_smartcard_settings(settings, origSettings))
247BOOL utils_sync_credentials(rdpSettings* settings, BOOL toGateway)
249 WINPR_ASSERT(settings);
250 if (!settings->GatewayUseSameCredentials)
255 if (!utils_str_copy(settings->Username, &settings->GatewayUsername))
257 if (!utils_str_copy(settings->Domain, &settings->GatewayDomain))
259 if (!utils_str_copy(settings->Password, &settings->GatewayPassword))
264 if (!utils_str_copy(settings->GatewayUsername, &settings->Username))
266 if (!utils_str_copy(settings->GatewayDomain, &settings->Domain))
268 if (!utils_str_copy(settings->GatewayPassword, &settings->Password))
274BOOL utils_persist_credentials(rdpSettings* settings,
const rdpSettings* current)
276 if (!settings || !current)
279 const SSIZE_T keys[] = { FreeRDP_GatewayUsername, FreeRDP_GatewayDomain,
280 FreeRDP_GatewayPassword, FreeRDP_Username,
281 FreeRDP_Domain, FreeRDP_Password };
283 for (
size_t x = 0; x < ARRAYSIZE(keys); x++)
285 const SSIZE_T key = keys[x];
288 WLog_ERR(TAG,
"Failed to copy %s from current to backup settings",
297BOOL utils_str_is_empty(
const char* str)
306BOOL utils_abort_connect(rdpRdp* rdp)
311 return SetEvent(rdp->abortEvent);
314BOOL utils_reset_abort(rdpRdp* rdp)
318 return ResetEvent(rdp->abortEvent);
321HANDLE utils_get_abort_event(rdpRdp* rdp)
324 return rdp->abortEvent;
327BOOL utils_abort_event_is_set(
const rdpRdp* rdp)
331 status = WaitForSingleObject(rdp->abortEvent, 0);
332 return status == WAIT_OBJECT_0;
335const char* utils_is_vsock(
const char* hostname)
340 const char vsock[8] = {
'v',
's',
'o',
'c',
'k',
':',
'/',
'/' };
341 if (strncmp(hostname, vsock,
sizeof(vsock)) == 0)
342 return &hostname[
sizeof(vsock)];
346static BOOL remove_rdpdr_type(rdpSettings* settings, UINT32 type)
352 printer = freerdp_device_collection_find_type(settings, type);
358 freerdp_device_free(printer);
363static BOOL disable_clipboard(rdpSettings* settings)
367 freerdp_static_channel_collection_del(settings, CLIPRDR_SVC_CHANNEL_NAME);
371static BOOL disable_drive(rdpSettings* settings)
378 return remove_rdpdr_type(settings, RDPDR_DTYP_FILESYSTEM);
381static BOOL disable_printers(rdpSettings* settings)
386 return remove_rdpdr_type(settings, RDPDR_DTYP_PRINT);
389static BOOL disable_port(rdpSettings* settings)
395 if (!remove_rdpdr_type(settings, RDPDR_DTYP_SERIAL))
397 return remove_rdpdr_type(settings, RDPDR_DTYP_PARALLEL);
400static BOOL disable_pnp(WINPR_ATTR_UNUSED rdpSettings* settings)
406static BOOL apply_gw_policy(rdpContext* context)
408 WINPR_ASSERT(context);
409 return utils_reload_channels(context);
412BOOL utils_apply_gateway_policy(wLog* log, rdpContext* context, UINT32 flags,
const char* module)
415 WINPR_ASSERT(context);
417 rdpSettings* settings = context->settings;
418 WINPR_ASSERT(settings);
420 if (flags & HTTP_TUNNEL_REDIR_ENABLE_ALL)
422 WLog_Print(log, WLOG_DEBUG,
"[%s] policy allows all redirections", module);
426 char buffer[128] = WINPR_C_ARRAY_INIT;
427 WLog_Print(log, WLOG_INFO,
"[%s] policy ignored on user request %s", module,
428 utils_redir_flags_to_string(flags, buffer,
sizeof(buffer)));
430 else if (flags & HTTP_TUNNEL_REDIR_DISABLE_ALL)
432 WLog_Print(log, WLOG_INFO,
"[%s] policy denies all redirections", module);
433 if (!disable_drive(settings))
435 if (!disable_printers(settings))
437 if (!disable_clipboard(settings))
439 if (!disable_port(settings))
441 if (!disable_pnp(settings))
443 if (!apply_gw_policy(context))
448 if (flags & HTTP_TUNNEL_REDIR_DISABLE_DRIVE)
450 WLog_Print(log, WLOG_INFO,
"[%s] policy denies drive redirections", module);
451 if (!disable_drive(settings))
454 if (flags & HTTP_TUNNEL_REDIR_DISABLE_PRINTER)
456 WLog_Print(log, WLOG_INFO,
"[%s] policy denies printer redirections", module);
457 if (!disable_printers(settings))
460 if (flags & HTTP_TUNNEL_REDIR_DISABLE_PORT)
462 WLog_Print(log, WLOG_INFO,
"[%s] policy denies port redirections", module);
463 if (!disable_port(settings))
466 if (flags & HTTP_TUNNEL_REDIR_DISABLE_CLIPBOARD)
468 WLog_Print(log, WLOG_INFO,
"[%s] policy denies clipboard redirections", module);
469 if (!disable_clipboard(settings))
472 if (flags & HTTP_TUNNEL_REDIR_DISABLE_PNP)
474 WLog_Print(log, WLOG_INFO,
"[%s] policy denies PNP redirections", module);
475 if (!disable_pnp(settings))
480 if (!apply_gw_policy(context))
487char* utils_redir_flags_to_string(UINT32 flags,
char* buffer,
size_t size)
489 winpr_str_append(
"{", buffer, size,
"");
490 if (flags & HTTP_TUNNEL_REDIR_ENABLE_ALL)
491 winpr_str_append(
"ENABLE_ALL", buffer, size,
"|");
492 if (flags & HTTP_TUNNEL_REDIR_DISABLE_ALL)
493 winpr_str_append(
"DISABLE_ALL", buffer, size,
"|");
494 if (flags & HTTP_TUNNEL_REDIR_DISABLE_DRIVE)
495 winpr_str_append(
"DISABLE_DRIVE", buffer, size,
"|");
496 if (flags & HTTP_TUNNEL_REDIR_DISABLE_PRINTER)
497 winpr_str_append(
"DISABLE_PRINTER", buffer, size,
"|");
498 if (flags & HTTP_TUNNEL_REDIR_DISABLE_PORT)
499 winpr_str_append(
"DISABLE_PORT", buffer, size,
"|");
500 if (flags & HTTP_TUNNEL_REDIR_DISABLE_CLIPBOARD)
501 winpr_str_append(
"DISABLE_CLIPBOARD", buffer, size,
"|");
502 if (flags & HTTP_TUNNEL_REDIR_DISABLE_PNP)
503 winpr_str_append(
"DISABLE_PNP", buffer, size,
"|");
505 char fbuffer[16] = WINPR_C_ARRAY_INIT;
506 (void)_snprintf(fbuffer,
sizeof(fbuffer),
"[0x%08" PRIx32
"]", flags);
508 winpr_str_append(fbuffer, buffer, size,
" ");
509 winpr_str_append(
"{", buffer, size,
"}");
513BOOL utils_reload_channels(rdpContext* context)
515 WINPR_ASSERT(context);
517 if (context->channels)
519 freerdp_channels_disconnect(context->channels, context->instance);
520 freerdp_channels_close(context->channels, context->instance);
521 freerdp_channels_free(context->channels);
524 context->channels = freerdp_channels_new(context->instance);
525 if (!context->channels)
528 freerdp_channels_register_instance(context->channels, context->instance);
531 IFCALLRET(context->instance->LoadChannels, rc, context->instance);
533 return freerdp_channels_pre_connect(context->channels, context->instance) == CHANNEL_RC_OK;
WINPR_ATTR_NODISCARD FREERDP_API const char * freerdp_settings_get_string(const rdpSettings *settings, FreeRDP_Settings_Keys_String id)
Returns a immutable string settings value.
WINPR_ATTR_NODISCARD FREERDP_API BOOL freerdp_settings_set_bool(rdpSettings *settings, FreeRDP_Settings_Keys_Bool id, BOOL val)
Sets a BOOL settings value.
WINPR_ATTR_NODISCARD FREERDP_API BOOL freerdp_settings_copy_item(rdpSettings *dst, const rdpSettings *src, SSIZE_T id)
copies one setting identified by id from src to dst
WINPR_ATTR_NODISCARD FREERDP_API BOOL freerdp_device_collection_del(rdpSettings *settings, const RDPDR_DEVICE *device)
Removed a device from the settings, returns ownership of the allocated device to caller.
WINPR_ATTR_NODISCARD FREERDP_API BOOL freerdp_settings_get_bool(const rdpSettings *settings, FreeRDP_Settings_Keys_Bool id)
Returns a boolean settings value.
WINPR_ATTR_NODISCARD FREERDP_API const char * freerdp_settings_get_name_for_key(SSIZE_T key)
Returns the type name for a key.