summaryrefslogtreecommitdiffstats
path: root/libfreerdp/core/peer.c
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-05-04 01:24:41 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-05-04 01:24:41 +0000
commita9bcc81f821d7c66f623779fa5147e728eb3c388 (patch)
tree98676963bcdd537ae5908a067a8eb110b93486a6 /libfreerdp/core/peer.c
parentInitial commit. (diff)
downloadfreerdp3-a9bcc81f821d7c66f623779fa5147e728eb3c388.tar.xz
freerdp3-a9bcc81f821d7c66f623779fa5147e728eb3c388.zip
Adding upstream version 3.3.0+dfsg1.upstream/3.3.0+dfsg1
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'libfreerdp/core/peer.c')
-rw-r--r--libfreerdp/core/peer.c1603
1 files changed, 1603 insertions, 0 deletions
diff --git a/libfreerdp/core/peer.c b/libfreerdp/core/peer.c
new file mode 100644
index 0000000..9d00c66
--- /dev/null
+++ b/libfreerdp/core/peer.c
@@ -0,0 +1,1603 @@
+/**
+ * FreeRDP: A Remote Desktop Protocol Implementation
+ * RDP Server Peer
+ *
+ * Copyright 2011 Vic Lee
+ * Copyright 2014 DI (FH) Martin Haimberger <martin.haimberger@thincast.com>
+ * Copyright 2023 Armin Novak <anovak@thincast.com>
+ * Copyright 2023 Thincast Technologies GmbH
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+#include <freerdp/config.h>
+
+#include "settings.h"
+
+#include <winpr/assert.h>
+#include <winpr/crt.h>
+#include <winpr/winsock.h>
+
+#include "info.h"
+#include "display.h"
+
+#include <freerdp/log.h>
+#include <freerdp/streamdump.h>
+#include <freerdp/redirection.h>
+#include <freerdp/crypto/certificate.h>
+
+#include "rdp.h"
+#include "peer.h"
+#include "multitransport.h"
+
+#define TAG FREERDP_TAG("core.peer")
+
+static state_run_t peer_recv_pdu(freerdp_peer* client, wStream* s);
+
+static HANDLE freerdp_peer_virtual_channel_open(freerdp_peer* client, const char* name,
+ UINT32 flags)
+{
+ UINT32 index = 0;
+ BOOL joined = FALSE;
+ rdpMcsChannel* mcsChannel = NULL;
+ rdpPeerChannel* peerChannel = NULL;
+ rdpMcs* mcs = NULL;
+
+ WINPR_ASSERT(client);
+ WINPR_ASSERT(client->context);
+ WINPR_ASSERT(client->context->rdp);
+ WINPR_ASSERT(name);
+ mcs = client->context->rdp->mcs;
+ WINPR_ASSERT(mcs);
+
+ if (flags & WTS_CHANNEL_OPTION_DYNAMIC)
+ return NULL; /* not yet supported */
+
+ const size_t length = strnlen(name, 9);
+
+ if (length > 8)
+ return NULL; /* SVC maximum name length is 8 */
+
+ for (; index < mcs->channelCount; index++)
+ {
+ mcsChannel = &(mcs->channels[index]);
+
+ if (!mcsChannel->joined)
+ continue;
+
+ if (_strnicmp(name, mcsChannel->Name, length) == 0)
+ {
+ joined = TRUE;
+ break;
+ }
+ }
+
+ if (!joined)
+ return NULL; /* channel is not joined */
+
+ peerChannel = (rdpPeerChannel*)mcsChannel->handle;
+
+ if (peerChannel)
+ {
+ /* channel is already open */
+ return (HANDLE)peerChannel;
+ }
+
+ peerChannel = server_channel_common_new(client, index, mcsChannel->ChannelId, 128, NULL, name);
+
+ if (peerChannel)
+ {
+ peerChannel->channelFlags = flags;
+ peerChannel->mcsChannel = mcsChannel;
+ mcsChannel->handle = (void*)peerChannel;
+ }
+
+ return (HANDLE)peerChannel;
+}
+
+static BOOL freerdp_peer_virtual_channel_close(freerdp_peer* client, HANDLE hChannel)
+{
+ rdpMcsChannel* mcsChannel = NULL;
+ rdpPeerChannel* peerChannel = NULL;
+
+ WINPR_ASSERT(client);
+
+ if (!hChannel)
+ return FALSE;
+
+ peerChannel = (rdpPeerChannel*)hChannel;
+ mcsChannel = peerChannel->mcsChannel;
+ WINPR_ASSERT(mcsChannel);
+ mcsChannel->handle = NULL;
+ server_channel_common_free(peerChannel);
+ return TRUE;
+}
+
+static int freerdp_peer_virtual_channel_write(freerdp_peer* client, HANDLE hChannel,
+ const BYTE* buffer, UINT32 length)
+{
+ wStream* s = NULL;
+ UINT32 flags = 0;
+ UINT32 chunkSize = 0;
+ UINT32 maxChunkSize = 0;
+ UINT32 totalLength = 0;
+ rdpPeerChannel* peerChannel = NULL;
+ rdpMcsChannel* mcsChannel = NULL;
+ rdpRdp* rdp = NULL;
+
+ WINPR_ASSERT(client);
+ WINPR_ASSERT(client->context);
+
+ rdp = client->context->rdp;
+ WINPR_ASSERT(rdp);
+ WINPR_ASSERT(rdp->settings);
+
+ if (!hChannel)
+ return -1;
+
+ peerChannel = (rdpPeerChannel*)hChannel;
+ mcsChannel = peerChannel->mcsChannel;
+ WINPR_ASSERT(peerChannel);
+ WINPR_ASSERT(mcsChannel);
+ if (peerChannel->channelFlags & WTS_CHANNEL_OPTION_DYNAMIC)
+ return -1; /* not yet supported */
+
+ maxChunkSize = rdp->settings->VCChunkSize;
+ totalLength = length;
+ flags = CHANNEL_FLAG_FIRST;
+
+ while (length > 0)
+ {
+ s = rdp_send_stream_init(rdp);
+
+ if (!s)
+ return -1;
+
+ if (length > maxChunkSize)
+ {
+ chunkSize = rdp->settings->VCChunkSize;
+ }
+ else
+ {
+ chunkSize = length;
+ flags |= CHANNEL_FLAG_LAST;
+ }
+
+ if (mcsChannel->options & CHANNEL_OPTION_SHOW_PROTOCOL)
+ flags |= CHANNEL_FLAG_SHOW_PROTOCOL;
+
+ Stream_Write_UINT32(s, totalLength);
+ Stream_Write_UINT32(s, flags);
+
+ if (!Stream_EnsureRemainingCapacity(s, chunkSize))
+ {
+ Stream_Release(s);
+ return -1;
+ }
+
+ Stream_Write(s, buffer, chunkSize);
+
+ if (!rdp_send(rdp, s, peerChannel->channelId))
+ return -1;
+
+ buffer += chunkSize;
+ length -= chunkSize;
+ flags = 0;
+ }
+
+ return 1;
+}
+
+static void* freerdp_peer_virtual_channel_get_data(freerdp_peer* client, HANDLE hChannel)
+{
+ rdpPeerChannel* peerChannel = (rdpPeerChannel*)hChannel;
+
+ WINPR_ASSERT(client);
+ if (!hChannel)
+ return NULL;
+
+ return peerChannel->extra;
+}
+
+static int freerdp_peer_virtual_channel_set_data(freerdp_peer* client, HANDLE hChannel, void* data)
+{
+ rdpPeerChannel* peerChannel = (rdpPeerChannel*)hChannel;
+
+ WINPR_ASSERT(client);
+ if (!hChannel)
+ return -1;
+
+ peerChannel->extra = data;
+ return 1;
+}
+
+static BOOL freerdp_peer_set_state(freerdp_peer* client, CONNECTION_STATE state)
+{
+ WINPR_ASSERT(client);
+ WINPR_ASSERT(client->context);
+ return rdp_server_transition_to_state(client->context->rdp, state);
+}
+
+static BOOL freerdp_peer_initialize(freerdp_peer* client)
+{
+ rdpRdp* rdp = NULL;
+ rdpSettings* settings = NULL;
+
+ WINPR_ASSERT(client);
+ WINPR_ASSERT(client->context);
+
+ rdp = client->context->rdp;
+ WINPR_ASSERT(rdp);
+
+ settings = rdp->settings;
+ WINPR_ASSERT(settings);
+
+ settings->ServerMode = TRUE;
+ settings->FrameAcknowledge = 0;
+ settings->LocalConnection = client->local;
+
+ const rdpCertificate* cert =
+ freerdp_settings_get_pointer(settings, FreeRDP_RdpServerCertificate);
+ if (!cert)
+ {
+ WLog_ERR(TAG, "Missing server certificate, can not continue.");
+ return FALSE;
+ }
+
+ if (freerdp_settings_get_bool(settings, FreeRDP_RdpSecurity))
+ {
+
+ if (!freerdp_certificate_is_rdp_security_compatible(cert))
+ {
+ if (!freerdp_settings_set_bool(settings, FreeRDP_RdpSecurity, FALSE))
+ return FALSE;
+ if (!freerdp_settings_set_bool(settings, FreeRDP_UseRdpSecurityLayer, FALSE))
+ return FALSE;
+ }
+ }
+
+ nego_set_RCG_supported(rdp->nego, settings->RemoteCredentialGuard);
+ if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_INITIAL))
+ return FALSE;
+
+ return TRUE;
+}
+
+#if defined(WITH_FREERDP_DEPRECATED)
+static BOOL freerdp_peer_get_fds(freerdp_peer* client, void** rfds, int* rcount)
+{
+ rdpTransport* transport = NULL;
+ WINPR_ASSERT(client);
+ WINPR_ASSERT(client->context);
+ WINPR_ASSERT(client->context->rdp);
+
+ transport = client->context->rdp->transport;
+ WINPR_ASSERT(transport);
+ transport_get_fds(transport, rfds, rcount);
+ return TRUE;
+}
+#endif
+
+static HANDLE freerdp_peer_get_event_handle(freerdp_peer* client)
+{
+ HANDLE hEvent = NULL;
+ rdpTransport* transport = NULL;
+ WINPR_ASSERT(client);
+ WINPR_ASSERT(client->context);
+ WINPR_ASSERT(client->context->rdp);
+
+ transport = client->context->rdp->transport;
+ hEvent = transport_get_front_bio(transport);
+ return hEvent;
+}
+
+static DWORD freerdp_peer_get_event_handles(freerdp_peer* client, HANDLE* events, DWORD count)
+{
+ WINPR_ASSERT(client);
+ WINPR_ASSERT(client->context);
+ WINPR_ASSERT(client->context->rdp);
+ return transport_get_event_handles(client->context->rdp->transport, events, count);
+}
+
+static BOOL freerdp_peer_check_fds(freerdp_peer* peer)
+{
+ int status = 0;
+ rdpRdp* rdp = NULL;
+
+ WINPR_ASSERT(peer);
+ WINPR_ASSERT(peer->context);
+
+ rdp = peer->context->rdp;
+ status = rdp_check_fds(rdp);
+
+ if (status < 0)
+ return FALSE;
+
+ return TRUE;
+}
+
+static state_run_t peer_recv_data_pdu(freerdp_peer* client, wStream* s, UINT16 totalLength)
+{
+ BYTE type = 0;
+ UINT16 length = 0;
+ UINT32 share_id = 0;
+ BYTE compressed_type = 0;
+ UINT16 compressed_len = 0;
+ rdpUpdate* update = NULL;
+
+ WINPR_ASSERT(s);
+ WINPR_ASSERT(client);
+ WINPR_ASSERT(client->context);
+ rdpRdp* rdp = client->context->rdp;
+ WINPR_ASSERT(rdp);
+ WINPR_ASSERT(rdp->mcs);
+
+ update = client->context->update;
+ WINPR_ASSERT(update);
+
+ if (!rdp_read_share_data_header(rdp, s, &length, &type, &share_id, &compressed_type,
+ &compressed_len))
+ return STATE_RUN_FAILED;
+
+#ifdef WITH_DEBUG_RDP
+ WLog_Print(rdp->log, WLOG_DEBUG, "recv %s Data PDU (0x%02" PRIX8 "), length: %" PRIu16 "",
+ data_pdu_type_to_string(type), type, length);
+#endif
+
+ switch (type)
+ {
+ case DATA_PDU_TYPE_SYNCHRONIZE:
+ if (!rdp_recv_client_synchronize_pdu(rdp, s))
+ return STATE_RUN_FAILED;
+
+ break;
+
+ case DATA_PDU_TYPE_CONTROL:
+ if (!rdp_server_accept_client_control_pdu(rdp, s))
+ return STATE_RUN_FAILED;
+
+ break;
+
+ case DATA_PDU_TYPE_INPUT:
+ if (!input_recv(rdp->input, s))
+ return STATE_RUN_FAILED;
+
+ break;
+
+ case DATA_PDU_TYPE_BITMAP_CACHE_PERSISTENT_LIST:
+ if (!rdp_server_accept_client_persistent_key_list_pdu(rdp, s))
+ return STATE_RUN_FAILED;
+ break;
+
+ case DATA_PDU_TYPE_FONT_LIST:
+ if (!rdp_server_accept_client_font_list_pdu(rdp, s))
+ return STATE_RUN_FAILED;
+
+ return STATE_RUN_CONTINUE; // State changed, trigger rerun
+
+ case DATA_PDU_TYPE_SHUTDOWN_REQUEST:
+ mcs_send_disconnect_provider_ultimatum(rdp->mcs);
+ WLog_WARN(TAG, "disconnect provider ultimatum sent to peer, closing connection");
+ return STATE_RUN_QUIT_SESSION;
+
+ case DATA_PDU_TYPE_FRAME_ACKNOWLEDGE:
+ if (!Stream_CheckAndLogRequiredLength(TAG, s, 4))
+ return STATE_RUN_FAILED;
+
+ Stream_Read_UINT32(s, client->ack_frame_id);
+ IFCALL(update->SurfaceFrameAcknowledge, update->context, client->ack_frame_id);
+ break;
+
+ case DATA_PDU_TYPE_REFRESH_RECT:
+ if (!update_read_refresh_rect(update, s))
+ return STATE_RUN_FAILED;
+
+ break;
+
+ case DATA_PDU_TYPE_SUPPRESS_OUTPUT:
+ if (!update_read_suppress_output(update, s))
+ return STATE_RUN_FAILED;
+
+ break;
+
+ default:
+ WLog_ERR(TAG, "Data PDU type %" PRIu8 "", type);
+ break;
+ }
+
+ return STATE_RUN_SUCCESS;
+}
+
+static state_run_t peer_recv_tpkt_pdu(freerdp_peer* client, wStream* s)
+{
+ state_run_t rc = STATE_RUN_SUCCESS;
+ rdpRdp* rdp = NULL;
+ UINT16 length = 0;
+ UINT16 pduType = 0;
+ UINT16 pduSource = 0;
+ UINT16 channelId = 0;
+ UINT16 securityFlags = 0;
+ rdpSettings* settings = NULL;
+
+ WINPR_ASSERT(s);
+ WINPR_ASSERT(client);
+ WINPR_ASSERT(client->context);
+
+ rdp = client->context->rdp;
+ WINPR_ASSERT(rdp);
+ WINPR_ASSERT(rdp->mcs);
+
+ settings = client->context->settings;
+ WINPR_ASSERT(settings);
+
+ if (!rdp_read_header(rdp, s, &length, &channelId))
+ return STATE_RUN_FAILED;
+
+ rdp->inPackets++;
+ if (freerdp_shall_disconnect_context(rdp->context))
+ return STATE_RUN_SUCCESS;
+
+ if (rdp_get_state(rdp) <= CONNECTION_STATE_LICENSING)
+ {
+ if (!rdp_read_security_header(rdp, s, &securityFlags, &length))
+ return STATE_RUN_FAILED;
+ if (securityFlags & SEC_ENCRYPT)
+ {
+ if (!rdp_decrypt(rdp, s, &length, securityFlags))
+ return STATE_RUN_FAILED;
+ }
+ return rdp_recv_message_channel_pdu(rdp, s, securityFlags);
+ }
+
+ if (settings->UseRdpSecurityLayer)
+ {
+ if (!rdp_read_security_header(rdp, s, &securityFlags, &length))
+ return STATE_RUN_FAILED;
+
+ if (securityFlags & SEC_ENCRYPT)
+ {
+ if (!rdp_decrypt(rdp, s, &length, securityFlags))
+ return STATE_RUN_FAILED;
+ }
+ }
+
+ if (channelId == MCS_GLOBAL_CHANNEL_ID)
+ {
+ char buffer[256] = { 0 };
+ UINT16 pduLength = 0;
+ UINT16 remain = 0;
+ if (!rdp_read_share_control_header(rdp, s, &pduLength, &remain, &pduType, &pduSource))
+ return STATE_RUN_FAILED;
+
+ settings->PduSource = pduSource;
+
+ WLog_DBG(TAG, "Received %s", pdu_type_to_str(pduType, buffer, sizeof(buffer)));
+ switch (pduType)
+ {
+ case PDU_TYPE_DATA:
+ rc = peer_recv_data_pdu(client, s, pduLength);
+ break;
+
+ case PDU_TYPE_CONFIRM_ACTIVE:
+ if (!rdp_server_accept_confirm_active(rdp, s, pduLength))
+ return STATE_RUN_FAILED;
+
+ break;
+
+ case PDU_TYPE_FLOW_RESPONSE:
+ case PDU_TYPE_FLOW_STOP:
+ case PDU_TYPE_FLOW_TEST:
+ if (!Stream_SafeSeek(s, remain))
+ {
+ WLog_WARN(TAG, "Short PDU, need %" PRIuz " bytes, got %" PRIuz, remain,
+ Stream_GetRemainingLength(s));
+ return STATE_RUN_FAILED;
+ }
+ break;
+
+ default:
+ WLog_ERR(TAG, "Client sent unknown pduType %" PRIu16 "", pduType);
+ return STATE_RUN_FAILED;
+ }
+ }
+ else if ((rdp->mcs->messageChannelId > 0) && (channelId == rdp->mcs->messageChannelId))
+ {
+ if (!settings->UseRdpSecurityLayer)
+ {
+ if (!rdp_read_security_header(rdp, s, &securityFlags, NULL))
+ return STATE_RUN_FAILED;
+ }
+
+ return rdp_recv_message_channel_pdu(rdp, s, securityFlags);
+ }
+ else
+ {
+ if (!freerdp_channel_peer_process(client, s, channelId))
+ return STATE_RUN_FAILED;
+ }
+ if (!tpkt_ensure_stream_consumed(s, length))
+ return STATE_RUN_FAILED;
+
+ return rc;
+}
+
+static state_run_t peer_recv_handle_auto_detect(freerdp_peer* client, wStream* s)
+{
+ state_run_t ret = STATE_RUN_FAILED;
+ rdpRdp* rdp = NULL;
+
+ WINPR_ASSERT(client);
+ WINPR_ASSERT(s);
+ WINPR_ASSERT(client->context);
+
+ rdp = client->context->rdp;
+ WINPR_ASSERT(rdp);
+
+ const rdpSettings* settings = client->context->settings;
+ WINPR_ASSERT(settings);
+
+ if (freerdp_settings_get_bool(settings, FreeRDP_NetworkAutoDetect))
+ {
+ switch (rdp_get_state(rdp))
+ {
+ case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_REQUEST:
+ autodetect_on_connect_time_auto_detect_begin(rdp->autodetect);
+ switch (autodetect_get_state(rdp->autodetect))
+ {
+ case FREERDP_AUTODETECT_STATE_REQUEST:
+ ret = STATE_RUN_SUCCESS;
+ if (!rdp_server_transition_to_state(
+ rdp, CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_RESPONSE))
+ return STATE_RUN_FAILED;
+ break;
+ case FREERDP_AUTODETECT_STATE_COMPLETE:
+ ret = STATE_RUN_CONTINUE; /* Rerun in next state */
+ if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_LICENSING))
+ return STATE_RUN_FAILED;
+ break;
+ default:
+ break;
+ }
+ break;
+ case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_RESPONSE:
+ ret = peer_recv_pdu(client, s);
+ if (state_run_success(ret))
+ {
+ autodetect_on_connect_time_auto_detect_progress(rdp->autodetect);
+ switch (autodetect_get_state(rdp->autodetect))
+ {
+ case FREERDP_AUTODETECT_STATE_REQUEST:
+ ret = STATE_RUN_SUCCESS;
+ break;
+ case FREERDP_AUTODETECT_STATE_COMPLETE:
+ ret = STATE_RUN_CONTINUE; /* Rerun in next state */
+ if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_LICENSING))
+ return STATE_RUN_FAILED;
+ break;
+ default:
+ break;
+ }
+ }
+ break;
+ default:
+ WINPR_ASSERT(FALSE);
+ break;
+ }
+ }
+ else
+ {
+ if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_LICENSING))
+ return STATE_RUN_FAILED;
+
+ ret = STATE_RUN_CONTINUE; /* Rerun in next state */
+ }
+
+ return ret;
+}
+
+static state_run_t peer_recv_handle_licensing(freerdp_peer* client, wStream* s)
+{
+ state_run_t ret = STATE_RUN_FAILED;
+ rdpRdp* rdp = NULL;
+ rdpSettings* settings = NULL;
+
+ WINPR_ASSERT(client);
+ WINPR_ASSERT(s);
+ WINPR_ASSERT(client->context);
+
+ rdp = client->context->rdp;
+ WINPR_ASSERT(rdp);
+
+ settings = rdp->settings;
+ WINPR_ASSERT(settings);
+
+ switch (license_get_state(rdp->license))
+ {
+ case LICENSE_STATE_INITIAL:
+ {
+ const BOOL required =
+ freerdp_settings_get_bool(settings, FreeRDP_ServerLicenseRequired);
+
+ if (required)
+ {
+ if (!license_server_configure(rdp->license))
+ ret = STATE_RUN_FAILED;
+ else if (!license_server_send_request(rdp->license))
+ ret = STATE_RUN_FAILED;
+ else
+ ret = STATE_RUN_SUCCESS;
+ }
+ else
+ {
+ if (license_send_valid_client_error_packet(rdp))
+ ret = STATE_RUN_CONTINUE; /* Rerun in next state, might be capabilities */
+ }
+ }
+ break;
+ case LICENSE_STATE_COMPLETED:
+ ret = STATE_RUN_CONTINUE; /* Licensing completed, continue in next state */
+ break;
+ case LICENSE_STATE_ABORTED:
+ ret = STATE_RUN_FAILED;
+ break;
+ default:
+ ret = peer_recv_pdu(client, s);
+ break;
+ }
+
+ return ret;
+}
+
+static state_run_t peer_recv_fastpath_pdu(freerdp_peer* client, wStream* s)
+{
+ rdpRdp* rdp = NULL;
+ UINT16 length = 0;
+ BOOL rc = 0;
+ rdpFastPath* fastpath = NULL;
+
+ WINPR_ASSERT(s);
+ WINPR_ASSERT(client);
+ WINPR_ASSERT(client->context);
+
+ rdp = client->context->rdp;
+ WINPR_ASSERT(rdp);
+
+ fastpath = rdp->fastpath;
+ WINPR_ASSERT(fastpath);
+
+ rc = fastpath_read_header_rdp(fastpath, s, &length);
+
+ if (!rc || (length == 0))
+ {
+ WLog_ERR(TAG, "incorrect FastPath PDU header length %" PRIu16 "", length);
+ return STATE_RUN_FAILED;
+ }
+ if (!Stream_CheckAndLogRequiredLength(TAG, s, length))
+ return STATE_RUN_FAILED;
+
+ if (!fastpath_decrypt(fastpath, s, &length))
+ return STATE_RUN_FAILED;
+
+ rdp->inPackets++;
+
+ return fastpath_recv_inputs(fastpath, s);
+}
+
+state_run_t peer_recv_pdu(freerdp_peer* client, wStream* s)
+{
+ int rc = tpkt_verify_header(s);
+
+ if (rc > 0)
+ return peer_recv_tpkt_pdu(client, s);
+ else if (rc == 0)
+ return peer_recv_fastpath_pdu(client, s);
+ else
+ return STATE_RUN_FAILED;
+}
+
+static state_run_t peer_unexpected_client_message(rdpRdp* rdp, UINT32 flag)
+{
+ char buffer[1024] = { 0 };
+ WLog_WARN(TAG, "Unexpected client message in state %s, missing flag %s",
+ rdp_get_state_string(rdp), rdp_finalize_flags_to_str(flag, buffer, sizeof(buffer)));
+ return STATE_RUN_SUCCESS; /* we ignore this as per spec input PDU are already allowed */
+}
+
+state_run_t rdp_peer_handle_state_demand_active(freerdp_peer* client)
+{
+ state_run_t ret = STATE_RUN_FAILED;
+
+ WINPR_ASSERT(client);
+ WINPR_ASSERT(client->context);
+
+ rdpRdp* rdp = client->context->rdp;
+ WINPR_ASSERT(rdp);
+
+ if (client->Capabilities && !client->Capabilities(client))
+ {
+ WLog_ERR(TAG, "[%s] freerdp_peer::Capabilities() callback failed",
+ rdp_get_state_string(rdp));
+ }
+ else if (!rdp_send_demand_active(rdp))
+ {
+ WLog_ERR(TAG, "[%s] rdp_send_demand_active() fail", rdp_get_state_string(rdp));
+ }
+ else
+ {
+ if (!rdp_server_transition_to_state(rdp,
+ CONNECTION_STATE_CAPABILITIES_EXCHANGE_MONITOR_LAYOUT))
+ return STATE_RUN_FAILED;
+ ret = STATE_RUN_CONTINUE;
+ }
+ return ret;
+}
+
+/** \brief Handle server peer state ACTIVE:
+ * On initial run (not connected, not activated) do not read data
+ *
+ * \return -1 in case of an error, 0 if no data needs to be processed, 1 to let
+ * the state machine run again and 2 if peer_recv_pdu must be called.
+ */
+static state_run_t rdp_peer_handle_state_active(freerdp_peer* client)
+{
+ state_run_t ret = STATE_RUN_FAILED;
+
+ WINPR_ASSERT(client);
+ WINPR_ASSERT(client->context);
+
+ rdpRdp* rdp = client->context->rdp;
+ WINPR_ASSERT(rdp);
+
+ if (!client->connected)
+ {
+ /**
+ * PostConnect should only be called once and should not
+ * be called after a reactivation sequence.
+ */
+ IFCALLRET(client->PostConnect, client->connected, client);
+ }
+ if (!client->connected)
+ {
+ WLog_ERR(TAG, "PostConnect for peer %p failed", client);
+ ret = STATE_RUN_FAILED;
+ }
+ else if (!client->activated)
+ {
+ BOOL activated = TRUE;
+
+ /* Set client->activated TRUE before calling the Activate callback.
+ * the Activate callback might reset the client->activated flag even if it returns success
+ * (e.g. deactivate/reactivate sequence) */
+ client->activated = TRUE;
+ IFCALLRET(client->Activate, activated, client);
+
+ if (!activated)
+ {
+ WLog_ERR(TAG, "Activate for peer %p failed", client);
+ ret = STATE_RUN_FAILED;
+ }
+ else
+ ret = STATE_RUN_SUCCESS;
+ }
+ else
+ ret = STATE_RUN_ACTIVE;
+ return ret;
+}
+
+static state_run_t peer_recv_callback_internal(rdpTransport* transport, wStream* s, void* extra)
+{
+ UINT32 SelectedProtocol = 0;
+ freerdp_peer* client = (freerdp_peer*)extra;
+ rdpRdp* rdp = NULL;
+ state_run_t ret = STATE_RUN_FAILED;
+ rdpSettings* settings = NULL;
+
+ WINPR_ASSERT(transport);
+ WINPR_ASSERT(client);
+ WINPR_ASSERT(client->context);
+
+ rdp = client->context->rdp;
+ WINPR_ASSERT(rdp);
+
+ settings = client->context->settings;
+ WINPR_ASSERT(settings);
+
+ IFCALL(client->ReachedState, client, rdp_get_state(rdp));
+ switch (rdp_get_state(rdp))
+ {
+ case CONNECTION_STATE_INITIAL:
+ if (rdp_server_transition_to_state(rdp, CONNECTION_STATE_NEGO))
+ ret = STATE_RUN_CONTINUE;
+ break;
+
+ case CONNECTION_STATE_NEGO:
+ if (!rdp_server_accept_nego(rdp, s))
+ {
+ WLog_ERR(TAG, "%s - rdp_server_accept_nego() fail", rdp_get_state_string(rdp));
+ }
+ else
+ {
+ SelectedProtocol = nego_get_selected_protocol(rdp->nego);
+ settings->RdstlsSecurity = (SelectedProtocol & PROTOCOL_RDSTLS) ? TRUE : FALSE;
+ settings->NlaSecurity = (SelectedProtocol & PROTOCOL_HYBRID) ? TRUE : FALSE;
+ settings->TlsSecurity = (SelectedProtocol & PROTOCOL_SSL) ? TRUE : FALSE;
+ settings->RdpSecurity = (SelectedProtocol == PROTOCOL_RDP) ? TRUE : FALSE;
+
+ if (SelectedProtocol & PROTOCOL_HYBRID)
+ {
+ SEC_WINNT_AUTH_IDENTITY_INFO* identity =
+ (SEC_WINNT_AUTH_IDENTITY_INFO*)nego_get_identity(rdp->nego);
+ sspi_CopyAuthIdentity(&client->identity, identity);
+ IFCALLRET(client->Logon, client->authenticated, client, &client->identity,
+ TRUE);
+ nego_free_nla(rdp->nego);
+ }
+ else
+ {
+ IFCALLRET(client->Logon, client->authenticated, client, &client->identity,
+ FALSE);
+ }
+ if (rdp_server_transition_to_state(rdp, CONNECTION_STATE_MCS_CREATE_REQUEST))
+ ret = STATE_RUN_SUCCESS;
+ }
+ break;
+
+ case CONNECTION_STATE_NLA:
+ WINPR_ASSERT(FALSE); // TODO
+ break;
+
+ case CONNECTION_STATE_MCS_CREATE_REQUEST:
+ if (!rdp_server_accept_mcs_connect_initial(rdp, s))
+ {
+ WLog_ERR(TAG,
+ "%s - "
+ "rdp_server_accept_mcs_connect_initial() fail",
+ rdp_get_state_string(rdp));
+ }
+ else
+ ret = STATE_RUN_SUCCESS;
+
+ break;
+
+ case CONNECTION_STATE_MCS_ERECT_DOMAIN:
+ if (!rdp_server_accept_mcs_erect_domain_request(rdp, s))
+ {
+ WLog_ERR(TAG,
+ "%s - "
+ "rdp_server_accept_mcs_erect_domain_request() fail",
+ rdp_get_state_string(rdp));
+ }
+ else
+ ret = STATE_RUN_SUCCESS;
+
+ break;
+
+ case CONNECTION_STATE_MCS_ATTACH_USER:
+ if (!rdp_server_accept_mcs_attach_user_request(rdp, s))
+ {
+ WLog_ERR(TAG,
+ "%s - "
+ "rdp_server_accept_mcs_attach_user_request() fail",
+ rdp_get_state_string(rdp));
+ }
+ else
+ ret = STATE_RUN_SUCCESS;
+
+ break;
+
+ case CONNECTION_STATE_MCS_CHANNEL_JOIN_REQUEST:
+ if (!rdp_server_accept_mcs_channel_join_request(rdp, s))
+ {
+ WLog_ERR(TAG,
+ "%s - "
+ "rdp_server_accept_mcs_channel_join_request() fail",
+ rdp_get_state_string(rdp));
+ }
+ else
+ ret = STATE_RUN_SUCCESS;
+ break;
+
+ case CONNECTION_STATE_RDP_SECURITY_COMMENCEMENT:
+ ret = STATE_RUN_SUCCESS;
+
+ if (!rdp_server_establish_keys(rdp, s))
+ {
+ WLog_ERR(TAG,
+ "%s - "
+ "rdp_server_establish_keys() fail",
+ rdp_get_state_string(rdp));
+ ret = STATE_RUN_FAILED;
+ }
+
+ if (state_run_success(ret))
+ {
+ if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_SECURE_SETTINGS_EXCHANGE))
+ ret = STATE_RUN_FAILED;
+ else if (Stream_GetRemainingLength(s) > 0)
+ ret = STATE_RUN_CONTINUE; /* Rerun function */
+ }
+ break;
+
+ case CONNECTION_STATE_SECURE_SETTINGS_EXCHANGE:
+ if (rdp_recv_client_info(rdp, s))
+ {
+ if (rdp_server_transition_to_state(
+ rdp, CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_REQUEST))
+ ret = STATE_RUN_CONTINUE;
+ }
+ break;
+
+ case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_REQUEST:
+ case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_RESPONSE:
+ ret = peer_recv_handle_auto_detect(client, s);
+ break;
+
+ case CONNECTION_STATE_LICENSING:
+ ret = peer_recv_handle_licensing(client, s);
+ if (ret == STATE_RUN_CONTINUE)
+ {
+ if (!rdp_server_transition_to_state(
+ rdp, CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_REQUEST))
+ ret = STATE_RUN_FAILED;
+ }
+ break;
+
+ case CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_REQUEST:
+ if (settings->SupportMultitransport &&
+ ((settings->MultitransportFlags & INITIATE_REQUEST_PROTOCOL_UDPFECR) != 0))
+ {
+ /* only UDP reliable for now, nobody does lossy UDP (MS-RDPUDP only) these days */
+ ret = multitransport_server_request(rdp->multitransport,
+ INITIATE_REQUEST_PROTOCOL_UDPFECR);
+ switch (ret)
+ {
+ case STATE_RUN_SUCCESS:
+ rdp_server_transition_to_state(
+ rdp, CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_RESPONSE);
+ break;
+ case STATE_RUN_CONTINUE:
+ /* mismatch on the supported kind of UDP transports */
+ rdp_server_transition_to_state(
+ rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE);
+ break;
+ default:
+ break;
+ }
+ }
+ else
+ {
+ if (rdp_server_transition_to_state(
+ rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE))
+ ret = STATE_RUN_CONTINUE; /* Rerun, initialize next state */
+ }
+ break;
+ case CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_RESPONSE:
+ ret = peer_recv_pdu(client, s);
+ break;
+
+ case CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE:
+ ret = rdp_peer_handle_state_demand_active(client);
+ break;
+
+ case CONNECTION_STATE_CAPABILITIES_EXCHANGE_MONITOR_LAYOUT:
+ if (freerdp_settings_get_bool(settings, FreeRDP_SupportMonitorLayoutPdu))
+ {
+ MONITOR_DEF* monitors = NULL;
+
+ IFCALL(client->AdjustMonitorsLayout, client);
+
+ /* client supports the monitorLayout PDU, let's send him the monitors if any */
+ ret = STATE_RUN_SUCCESS;
+ if (freerdp_settings_get_uint32(settings, FreeRDP_MonitorCount) == 0)
+ {
+ const UINT32 w = freerdp_settings_get_uint32(settings, FreeRDP_DesktopWidth);
+ const UINT32 h = freerdp_settings_get_uint32(settings, FreeRDP_DesktopHeight);
+ const rdpMonitor primary = { .x = 0,
+ .y = 0,
+ .width = w,
+ .height = h,
+ .is_primary = TRUE,
+ .orig_screen = 0,
+ .attributes = { .physicalWidth = w,
+ .physicalHeight = h,
+ .orientation =
+ ORIENTATION_LANDSCAPE,
+ .desktopScaleFactor = 100,
+ .deviceScaleFactor = 100 } };
+ if (!freerdp_settings_set_pointer_array(settings, FreeRDP_MonitorDefArray, 0,
+ &primary))
+ ret = STATE_RUN_FAILED;
+ else if (!freerdp_settings_set_uint32(settings, FreeRDP_MonitorCount, 1))
+ ret = STATE_RUN_FAILED;
+ }
+ if (state_run_failed(ret))
+ {
+ }
+ else if (!display_convert_rdp_monitor_to_monitor_def(
+ settings->MonitorCount, settings->MonitorDefArray, &monitors))
+ {
+ ret = STATE_RUN_FAILED;
+ }
+ else if (!freerdp_display_send_monitor_layout(rdp->context, settings->MonitorCount,
+ monitors))
+ {
+ ret = STATE_RUN_FAILED;
+ }
+ else
+ ret = STATE_RUN_SUCCESS;
+ free(monitors);
+
+ const size_t len = Stream_GetRemainingLength(s);
+ if (!state_run_failed(ret) && (len > 0))
+ ret = STATE_RUN_CONTINUE;
+ }
+ else
+ {
+ const size_t len = Stream_GetRemainingLength(s);
+ if (len > 0)
+ ret = STATE_RUN_CONTINUE;
+ else
+ ret = STATE_RUN_SUCCESS;
+ }
+ if (state_run_success(ret))
+ {
+ if (!rdp_server_transition_to_state(
+ rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE_CONFIRM_ACTIVE))
+ ret = STATE_RUN_FAILED;
+ }
+ break;
+
+ case CONNECTION_STATE_CAPABILITIES_EXCHANGE_CONFIRM_ACTIVE:
+ /**
+ * During reactivation sequence the client might sent some input or channel data
+ * before receiving the Deactivate All PDU. We need to process them as usual.
+ */
+ ret = peer_recv_pdu(client, s);
+ break;
+
+ case CONNECTION_STATE_FINALIZATION_SYNC:
+ ret = peer_recv_pdu(client, s);
+ if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_SYNCHRONIZE_PDU))
+ {
+ if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_FINALIZATION_COOPERATE))
+ ret = STATE_RUN_FAILED;
+ }
+ else
+ ret = peer_unexpected_client_message(rdp, FINALIZE_CS_SYNCHRONIZE_PDU);
+ break;
+ case CONNECTION_STATE_FINALIZATION_COOPERATE:
+ ret = peer_recv_pdu(client, s);
+ if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_CONTROL_COOPERATE_PDU))
+ {
+ if (!rdp_server_transition_to_state(rdp,
+ CONNECTION_STATE_FINALIZATION_REQUEST_CONTROL))
+ ret = STATE_RUN_FAILED;
+ }
+ else
+ ret = peer_unexpected_client_message(rdp, FINALIZE_CS_CONTROL_COOPERATE_PDU);
+ break;
+ case CONNECTION_STATE_FINALIZATION_REQUEST_CONTROL:
+ ret = peer_recv_pdu(client, s);
+ if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_CONTROL_REQUEST_PDU))
+ {
+ if (!rdp_send_server_control_granted_pdu(rdp))
+ ret = STATE_RUN_FAILED;
+ else if (!rdp_server_transition_to_state(
+ rdp, CONNECTION_STATE_FINALIZATION_PERSISTENT_KEY_LIST))
+ ret = STATE_RUN_FAILED;
+ }
+ else
+ ret = peer_unexpected_client_message(rdp, FINALIZE_CS_CONTROL_REQUEST_PDU);
+ break;
+ case CONNECTION_STATE_FINALIZATION_PERSISTENT_KEY_LIST:
+ if (freerdp_settings_get_bool(settings, FreeRDP_BitmapCachePersistEnabled) &&
+ !rdp_finalize_is_flag_set(rdp, FINALIZE_DEACTIVATE_REACTIVATE))
+ {
+ ret = peer_recv_pdu(client, s);
+
+ if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_PERSISTENT_KEY_LIST_PDU))
+ {
+ if (!rdp_server_transition_to_state(rdp,
+ CONNECTION_STATE_FINALIZATION_FONT_LIST))
+ ret = STATE_RUN_FAILED;
+ }
+ else
+ ret = peer_unexpected_client_message(rdp,
+ CONNECTION_STATE_FINALIZATION_FONT_LIST);
+ }
+ else
+ {
+ if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_FINALIZATION_FONT_LIST))
+ ret = STATE_RUN_FAILED;
+ else
+ ret = STATE_RUN_CONTINUE;
+ }
+ break;
+ case CONNECTION_STATE_FINALIZATION_FONT_LIST:
+ ret = peer_recv_pdu(client, s);
+ if (state_run_success(ret))
+ {
+ if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_FONT_LIST_PDU))
+ {
+ if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_ACTIVE))
+ ret = STATE_RUN_FAILED;
+ update_reset_state(rdp->update);
+ ret = STATE_RUN_CONTINUE;
+ }
+ else
+ ret = peer_unexpected_client_message(rdp, FINALIZE_CS_FONT_LIST_PDU);
+ }
+ break;
+
+ case CONNECTION_STATE_ACTIVE:
+ ret = rdp_peer_handle_state_active(client);
+ if (ret >= STATE_RUN_ACTIVE)
+ ret = peer_recv_pdu(client, s);
+ break;
+
+ /* States that must not happen in server state machine */
+ case CONNECTION_STATE_FINALIZATION_CLIENT_SYNC:
+ case CONNECTION_STATE_FINALIZATION_CLIENT_COOPERATE:
+ case CONNECTION_STATE_FINALIZATION_CLIENT_GRANTED_CONTROL:
+ case CONNECTION_STATE_FINALIZATION_CLIENT_FONT_MAP:
+ default:
+ WLog_ERR(TAG, "%s state %d", rdp_get_state_string(rdp), rdp_get_state(rdp));
+ break;
+ }
+
+ return ret;
+}
+
+static state_run_t peer_recv_callback(rdpTransport* transport, wStream* s, void* extra)
+{
+ char buffer[64] = { 0 };
+ state_run_t rc = STATE_RUN_FAILED;
+ const size_t start = Stream_GetPosition(s);
+ const rdpContext* context = transport_get_context(transport);
+ DWORD level = WLOG_TRACE;
+ static wLog* log = NULL;
+ if (!log)
+ log = WLog_Get(TAG);
+
+ WINPR_ASSERT(context);
+ do
+ {
+ const rdpRdp* rdp = context->rdp;
+ const char* old = rdp_get_state_string(rdp);
+
+ if (rc == STATE_RUN_TRY_AGAIN)
+ Stream_SetPosition(s, start);
+ rc = peer_recv_callback_internal(transport, s, extra);
+
+ const size_t len = Stream_GetRemainingLength(s);
+ if ((len > 0) && !state_run_continue(rc))
+ level = WLOG_WARN;
+ WLog_Print(log, level,
+ "(server)[%s -> %s] current return %s [%" PRIuz " bytes not processed]", old,
+ rdp_get_state_string(rdp), state_run_result_string(rc, buffer, sizeof(buffer)),
+ len);
+ } while (state_run_continue(rc));
+
+ return rc;
+}
+
+static BOOL freerdp_peer_close(freerdp_peer* client)
+{
+ UINT32 SelectedProtocol = 0;
+ rdpContext* context = NULL;
+
+ WINPR_ASSERT(client);
+
+ context = client->context;
+ WINPR_ASSERT(context);
+ WINPR_ASSERT(context->settings);
+ WINPR_ASSERT(context->rdp);
+
+ /** if negotiation has failed, we're not MCS connected. So don't
+ * send anything else, or some mstsc will consider that as an error
+ */
+ SelectedProtocol = nego_get_selected_protocol(context->rdp->nego);
+
+ if (SelectedProtocol & PROTOCOL_FAILED_NEGO)
+ return TRUE;
+
+ /**
+ * [MS-RDPBCGR] 1.3.1.4.2 User-Initiated Disconnection Sequence on Server
+ * The server first sends the client a Deactivate All PDU followed by an
+ * optional MCS Disconnect Provider Ultimatum PDU.
+ */
+ if (!rdp_send_deactivate_all(context->rdp))
+ return FALSE;
+
+ if (freerdp_settings_get_bool(context->settings, FreeRDP_SupportErrorInfoPdu))
+ {
+ rdp_send_error_info(context->rdp);
+ }
+
+ return mcs_send_disconnect_provider_ultimatum(context->rdp->mcs);
+}
+
+static void freerdp_peer_disconnect(freerdp_peer* client)
+{
+ rdpTransport* transport = NULL;
+ WINPR_ASSERT(client);
+
+ transport = freerdp_get_transport(client->context);
+ transport_disconnect(transport);
+}
+
+static BOOL freerdp_peer_send_channel_data(freerdp_peer* client, UINT16 channelId, const BYTE* data,
+ size_t size)
+{
+ WINPR_ASSERT(client);
+ WINPR_ASSERT(client->context);
+ WINPR_ASSERT(client->context->rdp);
+ return rdp_send_channel_data(client->context->rdp, channelId, data, size);
+}
+
+static BOOL freerdp_peer_send_server_redirection_pdu(freerdp_peer* peer,
+ const rdpRedirection* redirection)
+{
+ WINPR_ASSERT(peer);
+ WINPR_ASSERT(peer->context);
+
+ wStream* s = rdp_send_stream_pdu_init(peer->context->rdp);
+ if (!s)
+ return FALSE;
+ if (!rdp_write_enhanced_security_redirection_packet(s, redirection))
+ goto fail;
+ if (!rdp_send_pdu(peer->context->rdp, s, PDU_TYPE_SERVER_REDIRECTION, 0))
+ goto fail;
+
+ return rdp_reset_runtime_settings(peer->context->rdp);
+fail:
+ Stream_Release(s);
+ return FALSE;
+}
+
+static BOOL freerdp_peer_send_channel_packet(freerdp_peer* client, UINT16 channelId,
+ size_t totalSize, UINT32 flags, const BYTE* data,
+ size_t chunkSize)
+{
+ WINPR_ASSERT(client);
+ WINPR_ASSERT(client->context);
+ WINPR_ASSERT(client->context->rdp);
+ return rdp_channel_send_packet(client->context->rdp, channelId, totalSize, flags, data,
+ chunkSize);
+}
+
+static BOOL freerdp_peer_is_write_blocked(freerdp_peer* peer)
+{
+ rdpTransport* transport = NULL;
+ WINPR_ASSERT(peer);
+ WINPR_ASSERT(peer->context);
+ WINPR_ASSERT(peer->context->rdp);
+ WINPR_ASSERT(peer->context->rdp->transport);
+ transport = peer->context->rdp->transport;
+ return transport_is_write_blocked(transport);
+}
+
+static int freerdp_peer_drain_output_buffer(freerdp_peer* peer)
+{
+ rdpTransport* transport = NULL;
+ WINPR_ASSERT(peer);
+ WINPR_ASSERT(peer->context);
+ WINPR_ASSERT(peer->context->rdp);
+ WINPR_ASSERT(peer->context->rdp->transport);
+ transport = peer->context->rdp->transport;
+ return transport_drain_output_buffer(transport);
+}
+
+static BOOL freerdp_peer_has_more_to_read(freerdp_peer* peer)
+{
+ WINPR_ASSERT(peer);
+ WINPR_ASSERT(peer->context);
+ WINPR_ASSERT(peer->context->rdp);
+ return transport_have_more_bytes_to_read(peer->context->rdp->transport);
+}
+
+static LicenseCallbackResult freerdp_peer_nolicense(freerdp_peer* peer, wStream* s)
+{
+ rdpRdp* rdp = NULL;
+
+ WINPR_ASSERT(peer);
+ WINPR_ASSERT(peer->context);
+
+ rdp = peer->context->rdp;
+
+ if (!license_send_valid_client_error_packet(rdp))
+ {
+ WLog_ERR(TAG, "freerdp_peer_nolicense: license_send_valid_client_error_packet() failed");
+ return LICENSE_CB_ABORT;
+ }
+
+ return LICENSE_CB_COMPLETED;
+}
+
+BOOL freerdp_peer_context_new(freerdp_peer* client)
+{
+ return freerdp_peer_context_new_ex(client, NULL);
+}
+
+void freerdp_peer_context_free(freerdp_peer* client)
+{
+ if (!client)
+ return;
+
+ IFCALL(client->ContextFree, client, client->context);
+
+ if (client->context)
+ {
+ rdpContext* ctx = client->context;
+
+ CloseHandle(ctx->channelErrorEvent);
+ ctx->channelErrorEvent = NULL;
+ free(ctx->errorDescription);
+ ctx->errorDescription = NULL;
+ rdp_free(ctx->rdp);
+ ctx->rdp = NULL;
+ metrics_free(ctx->metrics);
+ ctx->metrics = NULL;
+ stream_dump_free(ctx->dump);
+ ctx->dump = NULL;
+ free(ctx);
+ }
+ client->context = NULL;
+}
+
+static const char* os_major_type_to_string(UINT16 osMajorType)
+{
+ switch (osMajorType)
+ {
+ case OSMAJORTYPE_UNSPECIFIED:
+ return "Unspecified platform";
+ case OSMAJORTYPE_WINDOWS:
+ return "Windows platform";
+ case OSMAJORTYPE_OS2:
+ return "OS/2 platform";
+ case OSMAJORTYPE_MACINTOSH:
+ return "Macintosh platform";
+ case OSMAJORTYPE_UNIX:
+ return "UNIX platform";
+ case OSMAJORTYPE_IOS:
+ return "iOS platform";
+ case OSMAJORTYPE_OSX:
+ return "OS X platform";
+ case OSMAJORTYPE_ANDROID:
+ return "Android platform";
+ case OSMAJORTYPE_CHROME_OS:
+ return "Chrome OS platform";
+ }
+
+ return "Unknown platform";
+}
+
+const char* freerdp_peer_os_major_type_string(freerdp_peer* client)
+{
+ rdpContext* context = NULL;
+ UINT16 osMajorType = 0;
+
+ WINPR_ASSERT(client);
+
+ context = client->context;
+ WINPR_ASSERT(context);
+ WINPR_ASSERT(context->settings);
+
+ osMajorType = freerdp_settings_get_uint32(context->settings, FreeRDP_OsMajorType);
+
+ return os_major_type_to_string(osMajorType);
+}
+
+static const char* os_minor_type_to_string(UINT16 osMinorType)
+{
+ switch (osMinorType)
+ {
+ case OSMINORTYPE_UNSPECIFIED:
+ return "Unspecified version";
+ case OSMINORTYPE_WINDOWS_31X:
+ return "Windows 3.1x";
+ case OSMINORTYPE_WINDOWS_95:
+ return "Windows 95";
+ case OSMINORTYPE_WINDOWS_NT:
+ return "Windows NT";
+ case OSMINORTYPE_OS2_V21:
+ return "OS/2 2.1";
+ case OSMINORTYPE_POWER_PC:
+ return "PowerPC";
+ case OSMINORTYPE_MACINTOSH:
+ return "Macintosh";
+ case OSMINORTYPE_NATIVE_XSERVER:
+ return "Native X Server";
+ case OSMINORTYPE_PSEUDO_XSERVER:
+ return "Pseudo X Server";
+ case OSMINORTYPE_WINDOWS_RT:
+ return "Windows RT";
+ }
+
+ return "Unknown version";
+}
+
+const char* freerdp_peer_os_minor_type_string(freerdp_peer* client)
+{
+ rdpContext* context = NULL;
+ UINT16 osMinorType = 0;
+
+ WINPR_ASSERT(client);
+
+ context = client->context;
+ WINPR_ASSERT(context);
+ WINPR_ASSERT(context->settings);
+
+ osMinorType = freerdp_settings_get_uint32(context->settings, FreeRDP_OsMinorType);
+
+ return os_minor_type_to_string(osMinorType);
+}
+
+freerdp_peer* freerdp_peer_new(int sockfd)
+{
+ UINT32 option_value = 0;
+ socklen_t option_len = 0;
+ freerdp_peer* client = (freerdp_peer*)calloc(1, sizeof(freerdp_peer));
+
+ if (!client)
+ return NULL;
+
+ option_value = TRUE;
+ option_len = sizeof(option_value);
+
+ if (sockfd >= 0)
+ setsockopt(sockfd, IPPROTO_TCP, TCP_NODELAY, (void*)&option_value, option_len);
+
+ if (client)
+ {
+ client->sockfd = sockfd;
+ client->ContextSize = sizeof(rdpContext);
+ client->Initialize = freerdp_peer_initialize;
+#if defined(WITH_FREERDP_DEPRECATED)
+ client->GetFileDescriptor = freerdp_peer_get_fds;
+#endif
+ client->GetEventHandle = freerdp_peer_get_event_handle;
+ client->GetEventHandles = freerdp_peer_get_event_handles;
+ client->CheckFileDescriptor = freerdp_peer_check_fds;
+ client->Close = freerdp_peer_close;
+ client->Disconnect = freerdp_peer_disconnect;
+ client->SendChannelData = freerdp_peer_send_channel_data;
+ client->SendChannelPacket = freerdp_peer_send_channel_packet;
+ client->SendServerRedirection = freerdp_peer_send_server_redirection_pdu;
+ client->IsWriteBlocked = freerdp_peer_is_write_blocked;
+ client->DrainOutputBuffer = freerdp_peer_drain_output_buffer;
+ client->HasMoreToRead = freerdp_peer_has_more_to_read;
+ client->VirtualChannelOpen = freerdp_peer_virtual_channel_open;
+ client->VirtualChannelClose = freerdp_peer_virtual_channel_close;
+ client->VirtualChannelWrite = freerdp_peer_virtual_channel_write;
+ client->VirtualChannelRead = NULL; /* must be defined by server application */
+ client->VirtualChannelGetData = freerdp_peer_virtual_channel_get_data;
+ client->VirtualChannelSetData = freerdp_peer_virtual_channel_set_data;
+ client->SetState = freerdp_peer_set_state;
+ }
+
+ return client;
+}
+
+void freerdp_peer_free(freerdp_peer* client)
+{
+ if (!client)
+ return;
+
+ sspi_FreeAuthIdentity(&client->identity);
+ closesocket((SOCKET)client->sockfd);
+ free(client);
+}
+
+static BOOL freerdp_peer_transport_setup(freerdp_peer* client)
+{
+ rdpRdp* rdp = NULL;
+
+ WINPR_ASSERT(client);
+ WINPR_ASSERT(client->context);
+
+ rdp = client->context->rdp;
+ WINPR_ASSERT(rdp);
+
+ if (!transport_attach(rdp->transport, client->sockfd))
+ return FALSE;
+
+ if (!transport_set_recv_callbacks(rdp->transport, peer_recv_callback, client))
+ return FALSE;
+
+ if (!transport_set_blocking_mode(rdp->transport, FALSE))
+ return FALSE;
+
+ return TRUE;
+}
+
+BOOL freerdp_peer_context_new_ex(freerdp_peer* client, const rdpSettings* settings)
+{
+ rdpRdp* rdp = NULL;
+ rdpContext* context = NULL;
+ BOOL ret = TRUE;
+
+ if (!client)
+ return FALSE;
+
+ if (!(context = (rdpContext*)calloc(1, client->ContextSize)))
+ goto fail;
+
+ client->context = context;
+ context->peer = client;
+ context->ServerMode = TRUE;
+ context->log = WLog_Get(TAG);
+ if (!context->log)
+ goto fail;
+
+ if (settings)
+ {
+ context->settings = freerdp_settings_clone(settings);
+ if (!context->settings)
+ goto fail;
+ }
+
+ context->dump = stream_dump_new();
+ if (!context->dump)
+ goto fail;
+ if (!(context->metrics = metrics_new(context)))
+ goto fail;
+
+ if (!(rdp = rdp_new(context)))
+ goto fail;
+
+ rdp_log_build_warnings(rdp);
+
+#if defined(WITH_FREERDP_DEPRECATED)
+ client->update = rdp->update;
+ client->settings = rdp->settings;
+ client->autodetect = rdp->autodetect;
+#endif
+ context->rdp = rdp;
+ context->input = rdp->input;
+ context->update = rdp->update;
+ context->settings = rdp->settings;
+ context->autodetect = rdp->autodetect;
+ update_register_server_callbacks(rdp->update);
+ autodetect_register_server_callbacks(rdp->autodetect);
+
+ if (!(context->channelErrorEvent = CreateEvent(NULL, TRUE, FALSE, NULL)))
+ {
+ WLog_ERR(TAG, "CreateEvent failed!");
+ goto fail;
+ }
+
+ if (!(context->errorDescription = calloc(1, 500)))
+ {
+ WLog_ERR(TAG, "calloc failed!");
+ goto fail;
+ }
+
+ if (!freerdp_peer_transport_setup(client))
+ goto fail;
+
+ client->IsWriteBlocked = freerdp_peer_is_write_blocked;
+ client->DrainOutputBuffer = freerdp_peer_drain_output_buffer;
+ client->HasMoreToRead = freerdp_peer_has_more_to_read;
+ client->LicenseCallback = freerdp_peer_nolicense;
+ IFCALLRET(client->ContextNew, ret, client, client->context);
+
+ if (!ret)
+ goto fail;
+ return TRUE;
+
+fail:
+ WLog_ERR(TAG, "ContextNew callback failed");
+ freerdp_peer_context_free(client);
+ return FALSE;
+}