23#include <freerdp/config.h>
27#include <winpr/assert.h>
28#include <winpr/cast.h>
30#include <winpr/winsock.h>
35#include <freerdp/log.h>
36#include <freerdp/streamdump.h>
37#include <freerdp/redirection.h>
38#include <freerdp/crypto/certificate.h>
42#include "multitransport.h"
44#define TAG FREERDP_TAG("core.peer")
46static state_run_t peer_recv_pdu(freerdp_peer* client,
wStream* s);
48static HANDLE freerdp_peer_virtual_channel_open(freerdp_peer* client,
const char* name,
53 rdpMcsChannel* mcsChannel =
nullptr;
54 rdpPeerChannel* peerChannel =
nullptr;
55 rdpMcs* mcs =
nullptr;
58 WINPR_ASSERT(client->context);
59 WINPR_ASSERT(client->context->rdp);
61 mcs = client->context->rdp->mcs;
64 if (flags & WTS_CHANNEL_OPTION_DYNAMIC)
67 const size_t length = strnlen(name, 9);
72 for (; index < mcs->channelCount; index++)
74 mcsChannel = &(mcs->channels[index]);
76 if (!mcsChannel->joined)
79 if (_strnicmp(name, mcsChannel->Name, length) == 0)
89 peerChannel = (rdpPeerChannel*)mcsChannel->handle;
94 return (HANDLE)peerChannel;
97 WINPR_ASSERT(index <= UINT16_MAX);
99 server_channel_common_new(client, (UINT16)index, mcsChannel->ChannelId, 128,
nullptr, name);
103 peerChannel->channelFlags = flags;
104 peerChannel->mcsChannel = mcsChannel;
105 mcsChannel->handle = (
void*)peerChannel;
108 return (HANDLE)peerChannel;
111static BOOL freerdp_peer_virtual_channel_close(WINPR_ATTR_UNUSED freerdp_peer* client,
114 rdpMcsChannel* mcsChannel =
nullptr;
115 rdpPeerChannel* peerChannel =
nullptr;
117 WINPR_ASSERT(client);
122 peerChannel = (rdpPeerChannel*)hChannel;
123 mcsChannel = peerChannel->mcsChannel;
124 WINPR_ASSERT(mcsChannel);
125 mcsChannel->handle =
nullptr;
126 server_channel_common_free(peerChannel);
130static int freerdp_peer_virtual_channel_write(freerdp_peer* client, HANDLE hChannel,
131 const BYTE* buffer, UINT32 length)
135 UINT32 chunkSize = 0;
136 UINT32 maxChunkSize = 0;
137 UINT32 totalLength = 0;
138 rdpPeerChannel* peerChannel =
nullptr;
139 rdpMcsChannel* mcsChannel =
nullptr;
140 rdpRdp* rdp =
nullptr;
142 WINPR_ASSERT(client);
143 WINPR_ASSERT(client->context);
145 rdp = client->context->rdp;
147 WINPR_ASSERT(rdp->settings);
152 peerChannel = (rdpPeerChannel*)hChannel;
153 mcsChannel = peerChannel->mcsChannel;
154 WINPR_ASSERT(peerChannel);
155 WINPR_ASSERT(mcsChannel);
156 if (peerChannel->channelFlags & WTS_CHANNEL_OPTION_DYNAMIC)
159 maxChunkSize = rdp->settings->VCChunkSize;
160 totalLength = length;
161 flags = CHANNEL_FLAG_FIRST;
165 UINT16 sec_flags = 0;
166 s = rdp_send_stream_init(rdp, &sec_flags);
171 if (length > maxChunkSize)
173 chunkSize = rdp->settings->VCChunkSize;
178 flags |= CHANNEL_FLAG_LAST;
181 if (mcsChannel->options & CHANNEL_OPTION_SHOW_PROTOCOL)
182 flags |= CHANNEL_FLAG_SHOW_PROTOCOL;
184 Stream_Write_UINT32(s, totalLength);
185 Stream_Write_UINT32(s, flags);
187 if (!Stream_EnsureRemainingCapacity(s, chunkSize))
193 Stream_Write(s, buffer, chunkSize);
195 WINPR_ASSERT(peerChannel->channelId <= UINT16_MAX);
196 if (!rdp_send(rdp, s, (UINT16)peerChannel->channelId, sec_flags))
207static void* freerdp_peer_virtual_channel_get_data(WINPR_ATTR_UNUSED freerdp_peer* client,
210 rdpPeerChannel* peerChannel = (rdpPeerChannel*)hChannel;
212 WINPR_ASSERT(client);
216 return peerChannel->extra;
219static int freerdp_peer_virtual_channel_set_data(WINPR_ATTR_UNUSED freerdp_peer* client,
220 HANDLE hChannel,
void* data)
222 rdpPeerChannel* peerChannel = (rdpPeerChannel*)hChannel;
224 WINPR_ASSERT(client);
228 peerChannel->extra = data;
232static BOOL freerdp_peer_set_state(freerdp_peer* client, CONNECTION_STATE state)
234 WINPR_ASSERT(client);
235 WINPR_ASSERT(client->context);
236 return rdp_server_transition_to_state(client->context->rdp, state);
239static BOOL freerdp_peer_initialize(freerdp_peer* client)
241 rdpRdp* rdp =
nullptr;
242 rdpSettings* settings =
nullptr;
244 WINPR_ASSERT(client);
245 WINPR_ASSERT(client->context);
247 rdp = client->context->rdp;
250 settings = rdp->settings;
251 WINPR_ASSERT(settings);
253 settings->ServerMode = TRUE;
254 settings->FrameAcknowledge = 0;
255 settings->LocalConnection = client->local;
257 const rdpCertificate* cert =
261 WLog_ERR(TAG,
"Missing server certificate, can not continue.");
268 if (!freerdp_certificate_is_rdp_security_compatible(cert))
277 nego_set_RCG_supported(rdp->nego, settings->RemoteCredentialGuard);
278 nego_set_restricted_admin_mode_supported(rdp->nego, settings->RestrictedAdminModeSupported);
280 return (rdp_server_transition_to_state(rdp, CONNECTION_STATE_INITIAL));
283#if defined(WITH_FREERDP_DEPRECATED)
284static BOOL freerdp_peer_get_fds(freerdp_peer* client,
void** rfds,
int* rcount)
286 rdpTransport* transport =
nullptr;
287 WINPR_ASSERT(client);
288 WINPR_ASSERT(client->context);
289 WINPR_ASSERT(client->context->rdp);
291 transport = client->context->rdp->transport;
292 WINPR_ASSERT(transport);
293 transport_get_fds(transport, rfds, rcount);
298static HANDLE freerdp_peer_get_event_handle(freerdp_peer* client)
300 HANDLE hEvent =
nullptr;
301 rdpTransport* transport =
nullptr;
302 WINPR_ASSERT(client);
303 WINPR_ASSERT(client->context);
304 WINPR_ASSERT(client->context->rdp);
306 transport = client->context->rdp->transport;
307 hEvent = transport_get_front_bio(transport);
311static DWORD freerdp_peer_get_event_handles(freerdp_peer* client, HANDLE* events, DWORD count)
313 WINPR_ASSERT(client);
314 WINPR_ASSERT(client->context);
315 WINPR_ASSERT(client->context->rdp);
316 return transport_get_event_handles(client->context->rdp->transport, events, count);
319static BOOL freerdp_peer_check_fds(freerdp_peer* peer)
322 rdpRdp* rdp =
nullptr;
325 WINPR_ASSERT(peer->context);
327 rdp = peer->context->rdp;
328 status = rdp_check_fds(rdp);
330 return (status >= 0);
333static state_run_t peer_recv_data_pdu(freerdp_peer* client,
wStream* s,
334 WINPR_ATTR_UNUSED UINT16 totalLength)
339 BYTE compressed_type = 0;
340 UINT16 compressed_len = 0;
341 rdpUpdate* update =
nullptr;
344 WINPR_ASSERT(client);
345 WINPR_ASSERT(client->context);
346 rdpRdp* rdp = client->context->rdp;
348 WINPR_ASSERT(rdp->mcs);
350 update = client->context->update;
351 WINPR_ASSERT(update);
353 if (!rdp_read_share_data_header(rdp, s, &length, &type, &share_id, &compressed_type,
355 return STATE_RUN_FAILED;
358 WLog_Print(rdp->log, WLOG_DEBUG,
"recv %s Data PDU (0x%02" PRIX8
"), length: %" PRIu16
"",
359 data_pdu_type_to_string(type), type, length);
364 case DATA_PDU_TYPE_SYNCHRONIZE:
365 if (!rdp_recv_client_synchronize_pdu(rdp, s))
366 return STATE_RUN_FAILED;
370 case DATA_PDU_TYPE_CONTROL:
371 if (!rdp_server_accept_client_control_pdu(rdp, s))
372 return STATE_RUN_FAILED;
376 case DATA_PDU_TYPE_INPUT:
377 if (!input_recv(rdp->input, s))
378 return STATE_RUN_FAILED;
382 case DATA_PDU_TYPE_BITMAP_CACHE_PERSISTENT_LIST:
383 if (!rdp_server_accept_client_persistent_key_list_pdu(rdp, s))
384 return STATE_RUN_FAILED;
387 case DATA_PDU_TYPE_FONT_LIST:
388 if (!rdp_server_accept_client_font_list_pdu(rdp, s))
389 return STATE_RUN_FAILED;
391 return STATE_RUN_CONTINUE;
393 case DATA_PDU_TYPE_SHUTDOWN_REQUEST:
394 mcs_send_disconnect_provider_ultimatum(rdp->mcs,
395 Disconnect_Ultimatum_provider_initiated);
396 WLog_WARN(TAG,
"disconnect provider ultimatum sent to peer, closing connection");
397 return STATE_RUN_QUIT_SESSION;
399 case DATA_PDU_TYPE_FRAME_ACKNOWLEDGE:
400 if (!Stream_CheckAndLogRequiredLength(TAG, s, 4))
401 return STATE_RUN_FAILED;
403 Stream_Read_UINT32(s, client->ack_frame_id);
404 if (update->SurfaceFrameAcknowledge)
406 if (!update->SurfaceFrameAcknowledge(update->context, client->ack_frame_id))
407 return STATE_RUN_FAILED;
411 case DATA_PDU_TYPE_REFRESH_RECT:
412 if (!update_read_refresh_rect(update, s))
413 return STATE_RUN_FAILED;
417 case DATA_PDU_TYPE_SUPPRESS_OUTPUT:
418 if (!update_read_suppress_output(update, s))
419 return STATE_RUN_FAILED;
424 WLog_ERR(TAG,
"Data PDU type %" PRIu8
"", type);
428 return STATE_RUN_SUCCESS;
431static state_run_t peer_recv_tpkt_pdu(freerdp_peer* client,
wStream* s)
433 state_run_t rc = STATE_RUN_SUCCESS;
436 UINT16 pduSource = 0;
437 UINT16 channelId = 0;
438 UINT16 securityFlags = 0;
441 WINPR_ASSERT(client);
442 WINPR_ASSERT(client->context);
444 rdpRdp* rdp = client->context->rdp;
446 WINPR_ASSERT(rdp->mcs);
448 rdpSettings* settings = client->context->settings;
449 WINPR_ASSERT(settings);
451 if (!rdp_read_header(rdp, s, &length, &channelId))
452 return STATE_RUN_FAILED;
455 if (freerdp_shall_disconnect_context(rdp->context))
456 return STATE_RUN_SUCCESS;
458 if (rdp_get_state(rdp) <= CONNECTION_STATE_LICENSING)
460 return rdp_handle_message_channel(rdp, s, channelId, length);
463 if (!rdp_handle_optional_rdp_decryption(rdp, s, &length, &securityFlags))
464 return STATE_RUN_FAILED;
466 if (channelId == MCS_GLOBAL_CHANNEL_ID)
468 char buffer[256] = WINPR_C_ARRAY_INIT;
469 UINT16 pduLength = 0;
471 if (!rdp_read_share_control_header(rdp, s, &pduLength, &remain, &pduType, &pduSource))
472 return STATE_RUN_FAILED;
474 settings->PduSource = pduSource;
476 WLog_DBG(TAG,
"Received %s", pdu_type_to_str(pduType, buffer,
sizeof(buffer)));
480 rc = peer_recv_data_pdu(client, s, pduLength);
483 case PDU_TYPE_CONFIRM_ACTIVE:
484 if (!rdp_server_accept_confirm_active(rdp, s, pduLength))
485 return STATE_RUN_FAILED;
489 case PDU_TYPE_FLOW_RESPONSE:
490 case PDU_TYPE_FLOW_STOP:
491 case PDU_TYPE_FLOW_TEST:
492 if (!Stream_SafeSeek(s, remain))
494 WLog_WARN(TAG,
"Short PDU, need %" PRIu16
" bytes, got %" PRIuz, remain,
495 Stream_GetRemainingLength(s));
496 return STATE_RUN_FAILED;
501 WLog_ERR(TAG,
"Client sent unknown pduType %" PRIu16
"", pduType);
502 return STATE_RUN_FAILED;
505 else if ((rdp->mcs->messageChannelId > 0) && (channelId == rdp->mcs->messageChannelId))
507 if (!settings->UseRdpSecurityLayer)
509 if (!rdp_read_security_header(rdp, s, &securityFlags,
nullptr))
510 return STATE_RUN_FAILED;
513 return rdp_recv_message_channel_pdu(rdp, s, securityFlags);
517 if (!freerdp_channel_peer_process(client, s, channelId))
518 return STATE_RUN_FAILED;
520 if (!tpkt_ensure_stream_consumed(rdp->log, s, length))
521 return STATE_RUN_FAILED;
526static state_run_t peer_recv_handle_auto_detect(freerdp_peer* client,
wStream* s)
528 state_run_t ret = STATE_RUN_FAILED;
529 rdpRdp* rdp =
nullptr;
531 WINPR_ASSERT(client);
533 WINPR_ASSERT(client->context);
535 rdp = client->context->rdp;
538 const rdpSettings* settings = client->context->settings;
539 WINPR_ASSERT(settings);
543 switch (rdp_get_state(rdp))
545 case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_REQUEST:
546 autodetect_on_connect_time_auto_detect_begin(rdp->autodetect);
547 switch (autodetect_get_state(rdp->autodetect))
549 case FREERDP_AUTODETECT_STATE_REQUEST:
550 ret = STATE_RUN_SUCCESS;
551 if (!rdp_server_transition_to_state(
552 rdp, CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_RESPONSE))
553 return STATE_RUN_FAILED;
555 case FREERDP_AUTODETECT_STATE_COMPLETE:
556 ret = STATE_RUN_CONTINUE;
557 if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_LICENSING))
558 return STATE_RUN_FAILED;
564 case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_RESPONSE:
565 ret = peer_recv_pdu(client, s);
566 if (state_run_success(ret))
568 autodetect_on_connect_time_auto_detect_progress(rdp->autodetect);
569 switch (autodetect_get_state(rdp->autodetect))
571 case FREERDP_AUTODETECT_STATE_REQUEST:
572 ret = STATE_RUN_SUCCESS;
574 case FREERDP_AUTODETECT_STATE_COMPLETE:
575 ret = STATE_RUN_CONTINUE;
576 if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_LICENSING))
577 return STATE_RUN_FAILED;
591 if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_LICENSING))
592 return STATE_RUN_FAILED;
594 ret = STATE_RUN_CONTINUE;
600static state_run_t peer_recv_handle_licensing(freerdp_peer* client,
wStream* s)
602 state_run_t ret = STATE_RUN_FAILED;
603 rdpRdp* rdp =
nullptr;
604 rdpSettings* settings =
nullptr;
606 WINPR_ASSERT(client);
608 WINPR_ASSERT(client->context);
610 rdp = client->context->rdp;
613 settings = rdp->settings;
614 WINPR_ASSERT(settings);
616 switch (license_get_state(rdp->license))
618 case LICENSE_STATE_INITIAL:
620 const BOOL required =
625 if (!license_server_configure(rdp->license))
626 ret = STATE_RUN_FAILED;
627 else if (!license_server_send_request(rdp->license))
628 ret = STATE_RUN_FAILED;
630 ret = STATE_RUN_SUCCESS;
634 if (license_send_valid_client_error_packet(rdp))
635 ret = STATE_RUN_CONTINUE;
639 case LICENSE_STATE_COMPLETED:
640 ret = STATE_RUN_CONTINUE;
642 case LICENSE_STATE_ABORTED:
643 ret = STATE_RUN_FAILED;
646 ret = peer_recv_pdu(client, s);
653static state_run_t peer_recv_fastpath_pdu(freerdp_peer* client,
wStream* s)
655 rdpRdp* rdp =
nullptr;
658 rdpFastPath* fastpath =
nullptr;
661 WINPR_ASSERT(client);
662 WINPR_ASSERT(client->context);
664 rdp = client->context->rdp;
667 fastpath = rdp->fastpath;
668 WINPR_ASSERT(fastpath);
670 rc = fastpath_read_header_rdp(fastpath, s, &length);
672 if (!rc || (length == 0))
674 WLog_ERR(TAG,
"incorrect FastPath PDU header length %" PRIu16
"", length);
675 return STATE_RUN_FAILED;
677 if (!Stream_CheckAndLogRequiredLength(TAG, s, length))
678 return STATE_RUN_FAILED;
680 if (!fastpath_decrypt(fastpath, s, &length))
681 return STATE_RUN_FAILED;
685 return fastpath_recv_inputs(fastpath, s);
688state_run_t peer_recv_pdu(freerdp_peer* client,
wStream* s)
690 int rc = tpkt_verify_header(s);
693 return peer_recv_tpkt_pdu(client, s);
695 return peer_recv_fastpath_pdu(client, s);
697 return STATE_RUN_FAILED;
700static state_run_t peer_unexpected_client_message(rdpRdp* rdp, UINT32 flag)
702 char buffer[1024] = WINPR_C_ARRAY_INIT;
703 WLog_WARN(TAG,
"Unexpected client message in state %s, missing flag %s",
704 rdp_get_state_string(rdp), rdp_finalize_flags_to_str(flag, buffer,
sizeof(buffer)));
705 return STATE_RUN_SUCCESS;
708state_run_t rdp_peer_handle_state_demand_active(freerdp_peer* client)
710 state_run_t ret = STATE_RUN_FAILED;
712 WINPR_ASSERT(client);
713 WINPR_ASSERT(client->context);
715 rdpRdp* rdp = client->context->rdp;
718 if (client->Capabilities && !client->Capabilities(client))
720 WLog_ERR(TAG,
"[%s] freerdp_peer::Capabilities() callback failed",
721 rdp_get_state_string(rdp));
723 else if (!rdp_send_demand_active(rdp))
725 WLog_ERR(TAG,
"[%s] rdp_send_demand_active() fail", rdp_get_state_string(rdp));
729 if (!rdp_server_transition_to_state(rdp,
730 CONNECTION_STATE_CAPABILITIES_EXCHANGE_MONITOR_LAYOUT))
731 return STATE_RUN_FAILED;
732 ret = STATE_RUN_CONTINUE;
743static state_run_t rdp_peer_handle_state_active(freerdp_peer* client)
745 state_run_t ret = STATE_RUN_FAILED;
747 WINPR_ASSERT(client);
748 WINPR_ASSERT(client->context);
750 if (!client->connected)
756 IFCALLRET(client->PostConnect, client->connected, client);
758 if (!client->connected)
760 WLog_ERR(TAG,
"PostConnect for peer %p failed", WINPR_CXX_COMPAT_CAST(
const void*, client));
761 ret = STATE_RUN_FAILED;
763 else if (!client->activated)
765 BOOL activated = TRUE;
770 client->activated = TRUE;
771 IFCALLRET(client->Activate, activated, client);
775 WLog_ERR(TAG,
"Activate for peer %p failed",
776 WINPR_CXX_COMPAT_CAST(
const void*, client));
777 ret = STATE_RUN_FAILED;
780 ret = STATE_RUN_SUCCESS;
783 ret = STATE_RUN_ACTIVE;
787static state_run_t peer_recv_callback_internal(WINPR_ATTR_UNUSED rdpTransport* transport,
790 freerdp_peer* client = (freerdp_peer*)extra;
791 state_run_t ret = STATE_RUN_FAILED;
793 WINPR_ASSERT(transport);
794 WINPR_ASSERT(client);
795 WINPR_ASSERT(client->context);
797 rdpRdp* rdp = client->context->rdp;
800 rdpSettings* settings = client->context->settings;
801 WINPR_ASSERT(settings);
803 if (client->ReachedState)
805 if (!client->ReachedState(client, rdp_get_state(rdp)))
806 return STATE_RUN_FAILED;
808 switch (rdp_get_state(rdp))
810 case CONNECTION_STATE_INITIAL:
811 if (!freerdp_settings_enforce_consistency(settings))
812 ret = STATE_RUN_FAILED;
813 else if (rdp_server_transition_to_state(rdp, CONNECTION_STATE_NEGO))
814 ret = STATE_RUN_CONTINUE;
817 case CONNECTION_STATE_NEGO:
818 if (!rdp_server_accept_nego(rdp, s))
820 WLog_ERR(TAG,
"%s - rdp_server_accept_nego() fail", rdp_get_state_string(rdp));
824 const UINT32 SelectedProtocol = nego_get_selected_protocol(rdp->nego);
826 settings->RdstlsSecurity = (SelectedProtocol & PROTOCOL_RDSTLS) != 0;
827 settings->NlaSecurity = (SelectedProtocol & PROTOCOL_HYBRID) != 0;
828 settings->TlsSecurity = (SelectedProtocol & PROTOCOL_SSL) != 0;
829 settings->RdpSecurity = (SelectedProtocol == PROTOCOL_RDP) != 0;
831 client->authenticated = FALSE;
832 if (SelectedProtocol & PROTOCOL_HYBRID)
836 if (sspi_CopyAuthIdentity(&client->identity, identity) >= 0)
838 client->authenticated =
839 IFCALLRESULT(TRUE, client->Logon, client, &client->identity, TRUE);
841 nego_free_nla(rdp->nego);
845 client->authenticated =
846 IFCALLRESULT(TRUE, client->Logon, client, &client->identity, FALSE);
848 if (!client->authenticated)
849 ret = STATE_RUN_FAILED;
852 if (rdp_server_transition_to_state(rdp, CONNECTION_STATE_MCS_CREATE_REQUEST))
853 ret = STATE_RUN_SUCCESS;
858 case CONNECTION_STATE_NLA:
862 case CONNECTION_STATE_MCS_CREATE_REQUEST:
863 if (!rdp_server_accept_mcs_connect_initial(rdp, s))
867 "rdp_server_accept_mcs_connect_initial() fail",
868 rdp_get_state_string(rdp));
871 ret = STATE_RUN_SUCCESS;
875 case CONNECTION_STATE_MCS_ERECT_DOMAIN:
876 if (!rdp_server_accept_mcs_erect_domain_request(rdp, s))
880 "rdp_server_accept_mcs_erect_domain_request() fail",
881 rdp_get_state_string(rdp));
884 ret = STATE_RUN_SUCCESS;
888 case CONNECTION_STATE_MCS_ATTACH_USER:
889 if (!rdp_server_accept_mcs_attach_user_request(rdp, s))
893 "rdp_server_accept_mcs_attach_user_request() fail",
894 rdp_get_state_string(rdp));
897 ret = STATE_RUN_SUCCESS;
901 case CONNECTION_STATE_MCS_CHANNEL_JOIN_REQUEST:
902 if (!rdp_server_accept_mcs_channel_join_request(rdp, s))
906 "rdp_server_accept_mcs_channel_join_request() fail",
907 rdp_get_state_string(rdp));
910 ret = STATE_RUN_SUCCESS;
913 case CONNECTION_STATE_RDP_SECURITY_COMMENCEMENT:
914 ret = STATE_RUN_SUCCESS;
916 if (!rdp_server_establish_keys(rdp, s))
920 "rdp_server_establish_keys() fail",
921 rdp_get_state_string(rdp));
922 ret = STATE_RUN_FAILED;
925 if (state_run_success(ret))
927 if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_SECURE_SETTINGS_EXCHANGE))
928 ret = STATE_RUN_FAILED;
929 else if (Stream_GetRemainingLength(s) > 0)
930 ret = STATE_RUN_CONTINUE;
934 case CONNECTION_STATE_SECURE_SETTINGS_EXCHANGE:
935 if (rdp_recv_client_info(rdp, s))
937 if (rdp_server_transition_to_state(
938 rdp, CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_REQUEST))
939 ret = STATE_RUN_CONTINUE;
943 case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_REQUEST:
944 case CONNECTION_STATE_CONNECT_TIME_AUTO_DETECT_RESPONSE:
945 ret = peer_recv_handle_auto_detect(client, s);
948 case CONNECTION_STATE_LICENSING:
949 ret = peer_recv_handle_licensing(client, s);
950 if (ret == STATE_RUN_CONTINUE)
952 if (!rdp_server_transition_to_state(
953 rdp, CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_REQUEST))
954 ret = STATE_RUN_FAILED;
958 case CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_REQUEST:
959 if (settings->SupportMultitransport &&
960 ((settings->MultitransportFlags & INITIATE_REQUEST_PROTOCOL_UDPFECR) != 0))
963 ret = multitransport_server_request(rdp->multitransport,
964 INITIATE_REQUEST_PROTOCOL_UDPFECR);
967 case STATE_RUN_SUCCESS:
968 if (!rdp_server_transition_to_state(
969 rdp, CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_RESPONSE))
970 ret = STATE_RUN_FAILED;
972 case STATE_RUN_CONTINUE:
974 if (!rdp_server_transition_to_state(
975 rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE))
976 ret = STATE_RUN_FAILED;
984 if (rdp_server_transition_to_state(
985 rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE))
986 ret = STATE_RUN_CONTINUE;
989 case CONNECTION_STATE_MULTITRANSPORT_BOOTSTRAPPING_RESPONSE:
990 ret = peer_recv_pdu(client, s);
993 case CONNECTION_STATE_CAPABILITIES_EXCHANGE_DEMAND_ACTIVE:
994 ret = rdp_peer_handle_state_demand_active(client);
997 case CONNECTION_STATE_CAPABILITIES_EXCHANGE_MONITOR_LAYOUT:
1002 if (client->AdjustMonitorsLayout)
1004 if (!client->AdjustMonitorsLayout(client))
1005 return STATE_RUN_FAILED;
1009 ret = STATE_RUN_SUCCESS;
1016 .width = WINPR_ASSERTING_INT_CAST(int32_t, w),
1017 .height = WINPR_ASSERTING_INT_CAST(int32_t, h),
1020 .attributes = { .physicalWidth = w,
1021 .physicalHeight = h,
1023 ORIENTATION_LANDSCAPE,
1024 .desktopScaleFactor = 100,
1025 .deviceScaleFactor = 100 } };
1026 if (!freerdp_settings_set_pointer_array(settings, FreeRDP_MonitorDefArray, 0,
1028 ret = STATE_RUN_FAILED;
1030 ret = STATE_RUN_FAILED;
1032 if (state_run_failed(ret))
1035 else if (!display_convert_rdp_monitor_to_monitor_def(
1036 settings->MonitorCount, settings->MonitorDefArray, &monitors))
1038 ret = STATE_RUN_FAILED;
1040 else if (!freerdp_display_send_monitor_layout(rdp->context, settings->MonitorCount,
1043 ret = STATE_RUN_FAILED;
1046 ret = STATE_RUN_SUCCESS;
1049 const size_t len = Stream_GetRemainingLength(s);
1050 if (!state_run_failed(ret) && (len > 0))
1051 ret = STATE_RUN_CONTINUE;
1055 const size_t len = Stream_GetRemainingLength(s);
1057 ret = STATE_RUN_CONTINUE;
1059 ret = STATE_RUN_SUCCESS;
1061 if (state_run_success(ret))
1063 if (!rdp_server_transition_to_state(
1064 rdp, CONNECTION_STATE_CAPABILITIES_EXCHANGE_CONFIRM_ACTIVE))
1065 ret = STATE_RUN_FAILED;
1069 case CONNECTION_STATE_CAPABILITIES_EXCHANGE_CONFIRM_ACTIVE:
1074 ret = peer_recv_pdu(client, s);
1077 case CONNECTION_STATE_FINALIZATION_SYNC:
1078 ret = peer_recv_pdu(client, s);
1079 if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_SYNCHRONIZE_PDU))
1081 if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_FINALIZATION_COOPERATE))
1082 ret = STATE_RUN_FAILED;
1085 ret = peer_unexpected_client_message(rdp, FINALIZE_CS_SYNCHRONIZE_PDU);
1087 case CONNECTION_STATE_FINALIZATION_COOPERATE:
1088 ret = peer_recv_pdu(client, s);
1089 if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_CONTROL_COOPERATE_PDU))
1091 if (!rdp_server_transition_to_state(rdp,
1092 CONNECTION_STATE_FINALIZATION_REQUEST_CONTROL))
1093 ret = STATE_RUN_FAILED;
1096 ret = peer_unexpected_client_message(rdp, FINALIZE_CS_CONTROL_COOPERATE_PDU);
1098 case CONNECTION_STATE_FINALIZATION_REQUEST_CONTROL:
1099 ret = peer_recv_pdu(client, s);
1100 if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_CONTROL_REQUEST_PDU))
1102 if (!rdp_send_server_control_granted_pdu(rdp))
1103 ret = STATE_RUN_FAILED;
1104 else if (!rdp_server_transition_to_state(
1105 rdp, CONNECTION_STATE_FINALIZATION_PERSISTENT_KEY_LIST))
1106 ret = STATE_RUN_FAILED;
1109 ret = peer_unexpected_client_message(rdp, FINALIZE_CS_CONTROL_REQUEST_PDU);
1111 case CONNECTION_STATE_FINALIZATION_PERSISTENT_KEY_LIST:
1113 !rdp_finalize_is_flag_set(rdp, FINALIZE_DEACTIVATE_REACTIVATE))
1115 ret = peer_recv_pdu(client, s);
1117 if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_PERSISTENT_KEY_LIST_PDU))
1119 if (!rdp_server_transition_to_state(rdp,
1120 CONNECTION_STATE_FINALIZATION_FONT_LIST))
1121 ret = STATE_RUN_FAILED;
1124 ret = peer_unexpected_client_message(rdp,
1125 CONNECTION_STATE_FINALIZATION_FONT_LIST);
1129 if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_FINALIZATION_FONT_LIST))
1130 ret = STATE_RUN_FAILED;
1132 ret = STATE_RUN_CONTINUE;
1135 case CONNECTION_STATE_FINALIZATION_FONT_LIST:
1136 ret = peer_recv_pdu(client, s);
1137 if (state_run_success(ret))
1139 if (rdp_finalize_is_flag_set(rdp, FINALIZE_CS_FONT_LIST_PDU))
1141 if (!rdp_server_transition_to_state(rdp, CONNECTION_STATE_ACTIVE))
1142 ret = STATE_RUN_FAILED;
1145 update_reset_state(rdp->update);
1146 ret = STATE_RUN_CONTINUE;
1150 ret = peer_unexpected_client_message(rdp, FINALIZE_CS_FONT_LIST_PDU);
1154 case CONNECTION_STATE_ACTIVE:
1155 ret = rdp_peer_handle_state_active(client);
1156 if (ret >= STATE_RUN_ACTIVE)
1157 ret = peer_recv_pdu(client, s);
1161 case CONNECTION_STATE_FINALIZATION_CLIENT_SYNC:
1162 case CONNECTION_STATE_FINALIZATION_CLIENT_COOPERATE:
1163 case CONNECTION_STATE_FINALIZATION_CLIENT_GRANTED_CONTROL:
1164 case CONNECTION_STATE_FINALIZATION_CLIENT_FONT_MAP:
1166 WLog_ERR(TAG,
"%s state %" PRId32, rdp_get_state_string(rdp),
1167 WINPR_CXX_COMPAT_CAST(int32_t, rdp_get_state(rdp)));
1174static state_run_t peer_recv_callback(rdpTransport* transport,
wStream* s,
void* extra)
1176 char buffer[64] = WINPR_C_ARRAY_INIT;
1177 state_run_t rc = STATE_RUN_FAILED;
1178 const size_t start = Stream_GetPosition(s);
1179 const rdpContext* context = transport_get_context(transport);
1180 DWORD level = WLOG_TRACE;
1181 static wLog* log =
nullptr;
1183 log = WLog_Get(TAG);
1185 WINPR_ASSERT(context);
1188 const rdpRdp* rdp = context->rdp;
1189 const char* old = rdp_get_state_string(rdp);
1191 if (rc == STATE_RUN_TRY_AGAIN)
1192 Stream_SetPosition(s, start);
1193 rc = peer_recv_callback_internal(transport, s, extra);
1195 const size_t len = Stream_GetRemainingLength(s);
1196 if ((len > 0) && !state_run_continue(rc))
1198 WLog_Print(log, level,
1199 "(server)[%s -> %s] current return %s [%" PRIuz
" bytes not processed]", old,
1200 rdp_get_state_string(rdp), state_run_result_string(rc, buffer,
sizeof(buffer)),
1202 }
while (state_run_continue(rc));
1207static BOOL freerdp_peer_close(freerdp_peer* client)
1209 UINT32 SelectedProtocol = 0;
1210 rdpContext* context =
nullptr;
1212 WINPR_ASSERT(client);
1214 context = client->context;
1215 WINPR_ASSERT(context);
1216 WINPR_ASSERT(context->settings);
1217 WINPR_ASSERT(context->rdp);
1222 SelectedProtocol = nego_get_selected_protocol(context->rdp->nego);
1224 if (SelectedProtocol & PROTOCOL_FAILED_NEGO)
1232 if (!rdp_send_deactivate_all(context->rdp))
1237 if (!rdp_send_error_info(context->rdp))
1241 return mcs_send_disconnect_provider_ultimatum(context->rdp->mcs,
1242 Disconnect_Ultimatum_provider_initiated);
1245static void freerdp_peer_disconnect(freerdp_peer* client)
1247 rdpTransport* transport =
nullptr;
1248 WINPR_ASSERT(client);
1250 transport = freerdp_get_transport(client->context);
1251 transport_disconnect(transport);
1254static BOOL freerdp_peer_send_channel_data(freerdp_peer* client, UINT16 channelId,
const BYTE* data,
1257 WINPR_ASSERT(client);
1258 WINPR_ASSERT(client->context);
1259 WINPR_ASSERT(client->context->rdp);
1260 return rdp_send_channel_data(client->context->rdp, channelId, data, size);
1263static BOOL freerdp_peer_send_server_redirection_pdu(freerdp_peer* peer,
1264 const rdpRedirection* redirection)
1268 WINPR_ASSERT(peer->context);
1270 UINT16 sec_flags = 0;
1271 wStream* s = rdp_send_stream_pdu_init(peer->context->rdp, &sec_flags);
1274 if (!rdp_write_enhanced_security_redirection_packet(s, redirection))
1276 if (!rdp_send_pdu(peer->context->rdp, s, PDU_TYPE_SERVER_REDIRECTION, 0, sec_flags))
1278 rc = rdp_reset_runtime_settings(peer->context->rdp);
1284static BOOL freerdp_peer_send_channel_packet(freerdp_peer* client, UINT16 channelId,
1285 size_t totalSize, UINT32 flags,
const BYTE* data,
1288 WINPR_ASSERT(client);
1289 WINPR_ASSERT(client->context);
1290 WINPR_ASSERT(client->context->rdp);
1291 return rdp_channel_send_packet(client->context->rdp, channelId, totalSize, flags, data,
1295static BOOL freerdp_peer_is_write_blocked(freerdp_peer* peer)
1297 rdpTransport* transport =
nullptr;
1299 WINPR_ASSERT(peer->context);
1300 WINPR_ASSERT(peer->context->rdp);
1301 WINPR_ASSERT(peer->context->rdp->transport);
1302 transport = peer->context->rdp->transport;
1303 return transport_is_write_blocked(transport);
1306static int freerdp_peer_drain_output_buffer(freerdp_peer* peer)
1308 rdpTransport* transport =
nullptr;
1310 WINPR_ASSERT(peer->context);
1311 WINPR_ASSERT(peer->context->rdp);
1312 WINPR_ASSERT(peer->context->rdp->transport);
1313 transport = peer->context->rdp->transport;
1314 return transport_drain_output_buffer(transport);
1317static BOOL freerdp_peer_has_more_to_read(freerdp_peer* peer)
1320 WINPR_ASSERT(peer->context);
1321 WINPR_ASSERT(peer->context->rdp);
1322 return transport_have_more_bytes_to_read(peer->context->rdp->transport);
1325static LicenseCallbackResult freerdp_peer_nolicense(freerdp_peer* peer,
1328 rdpRdp* rdp =
nullptr;
1331 WINPR_ASSERT(peer->context);
1333 rdp = peer->context->rdp;
1335 if (!license_send_valid_client_error_packet(rdp))
1337 WLog_ERR(TAG,
"freerdp_peer_nolicense: license_send_valid_client_error_packet() failed");
1338 return LICENSE_CB_ABORT;
1341 return LICENSE_CB_COMPLETED;
1344BOOL freerdp_peer_context_new(freerdp_peer* client)
1346 return freerdp_peer_context_new_ex(client,
nullptr);
1349void freerdp_peer_context_free(freerdp_peer* client)
1354 IFCALL(client->ContextFree, client, client->context);
1356 if (client->context)
1358 rdpContext* ctx = client->context;
1360 (void)CloseHandle(ctx->channelErrorEvent);
1361 ctx->channelErrorEvent =
nullptr;
1362 free(ctx->errorDescription);
1363 ctx->errorDescription =
nullptr;
1366 metrics_free(ctx->metrics);
1367 ctx->metrics =
nullptr;
1368 stream_dump_free(ctx->dump);
1369 ctx->dump =
nullptr;
1372 client->context =
nullptr;
1375static const char* os_major_type_to_string(UINT16 osMajorType)
1377 switch (osMajorType)
1379 case OSMAJORTYPE_UNSPECIFIED:
1380 return "Unspecified platform";
1381 case OSMAJORTYPE_WINDOWS:
1382 return "Windows platform";
1383 case OSMAJORTYPE_OS2:
1384 return "OS/2 platform";
1385 case OSMAJORTYPE_MACINTOSH:
1386 return "Macintosh platform";
1387 case OSMAJORTYPE_UNIX:
1388 return "UNIX platform";
1389 case OSMAJORTYPE_IOS:
1390 return "iOS platform";
1391 case OSMAJORTYPE_OSX:
1392 return "OS X platform";
1393 case OSMAJORTYPE_ANDROID:
1394 return "Android platform";
1395 case OSMAJORTYPE_CHROME_OS:
1396 return "Chrome OS platform";
1401 return "Unknown platform";
1404const char* freerdp_peer_os_major_type_string(freerdp_peer* client)
1406 WINPR_ASSERT(client);
1408 rdpContext* context = client->context;
1409 WINPR_ASSERT(context);
1410 WINPR_ASSERT(context->settings);
1413 WINPR_ASSERT(osMajorType <= UINT16_MAX);
1414 return os_major_type_to_string((UINT16)osMajorType);
1417static const char* os_minor_type_to_string(UINT16 osMinorType)
1419 switch (osMinorType)
1421 case OSMINORTYPE_UNSPECIFIED:
1422 return "Unspecified version";
1423 case OSMINORTYPE_WINDOWS_31X:
1424 return "Windows 3.1x";
1425 case OSMINORTYPE_WINDOWS_95:
1426 return "Windows 95";
1427 case OSMINORTYPE_WINDOWS_NT:
1428 return "Windows NT";
1429 case OSMINORTYPE_OS2_V21:
1431 case OSMINORTYPE_POWER_PC:
1433 case OSMINORTYPE_MACINTOSH:
1435 case OSMINORTYPE_NATIVE_XSERVER:
1436 return "Native X Server";
1437 case OSMINORTYPE_PSEUDO_XSERVER:
1438 return "Pseudo X Server";
1439 case OSMINORTYPE_WINDOWS_RT:
1440 return "Windows RT";
1445 return "Unknown version";
1448const char* freerdp_peer_os_minor_type_string(freerdp_peer* client)
1450 WINPR_ASSERT(client);
1452 rdpContext* context = client->context;
1453 WINPR_ASSERT(context);
1454 WINPR_ASSERT(context->settings);
1457 WINPR_ASSERT(osMinorType <= UINT16_MAX);
1458 return os_minor_type_to_string((UINT16)osMinorType);
1461freerdp_peer* freerdp_peer_new(
int sockfd)
1463 freerdp_peer* client = (freerdp_peer*)calloc(1,
sizeof(freerdp_peer));
1470 (void)freerdp_tcp_set_nodelay(WLog_Get(TAG), WLOG_DEBUG, sockfd);
1475 client->sockfd = sockfd;
1476 client->ContextSize =
sizeof(rdpContext);
1477 client->Initialize = freerdp_peer_initialize;
1478#if defined(WITH_FREERDP_DEPRECATED)
1479 client->GetFileDescriptor = freerdp_peer_get_fds;
1481 client->GetEventHandle = freerdp_peer_get_event_handle;
1482 client->GetEventHandles = freerdp_peer_get_event_handles;
1483 client->CheckFileDescriptor = freerdp_peer_check_fds;
1484 client->Close = freerdp_peer_close;
1485 client->Disconnect = freerdp_peer_disconnect;
1486 client->SendChannelData = freerdp_peer_send_channel_data;
1487 client->SendChannelPacket = freerdp_peer_send_channel_packet;
1488 client->SendServerRedirection = freerdp_peer_send_server_redirection_pdu;
1489 client->IsWriteBlocked = freerdp_peer_is_write_blocked;
1490 client->DrainOutputBuffer = freerdp_peer_drain_output_buffer;
1491 client->HasMoreToRead = freerdp_peer_has_more_to_read;
1492 client->VirtualChannelOpen = freerdp_peer_virtual_channel_open;
1493 client->VirtualChannelClose = freerdp_peer_virtual_channel_close;
1494 client->VirtualChannelWrite = freerdp_peer_virtual_channel_write;
1495 client->VirtualChannelRead =
nullptr;
1496 client->VirtualChannelGetData = freerdp_peer_virtual_channel_get_data;
1497 client->VirtualChannelSetData = freerdp_peer_virtual_channel_set_data;
1498 client->SetState = freerdp_peer_set_state;
1504void freerdp_peer_free(freerdp_peer* client)
1509 sspi_FreeAuthIdentity(&client->identity);
1510 if (client->sockfd >= 0)
1511 closesocket((SOCKET)client->sockfd);
1515static BOOL freerdp_peer_transport_setup(freerdp_peer* client)
1517 rdpRdp* rdp =
nullptr;
1519 WINPR_ASSERT(client);
1520 WINPR_ASSERT(client->context);
1522 rdp = client->context->rdp;
1525 if (!transport_attach(rdp->transport, client->sockfd))
1527 client->sockfd = -1;
1529 if (!transport_set_recv_callbacks(rdp->transport, peer_recv_callback, client))
1532 if (!transport_set_blocking_mode(rdp->transport, FALSE))
1538BOOL freerdp_peer_context_new_ex(freerdp_peer* client,
const rdpSettings* settings)
1540 rdpRdp* rdp =
nullptr;
1541 rdpContext* context =
nullptr;
1547 WINPR_ASSERT(client->ContextSize >=
sizeof(rdpContext));
1548 if (!(context = (rdpContext*)calloc(1, client->ContextSize)))
1551 client->context = context;
1552 context->peer = client;
1553 context->ServerMode = TRUE;
1554 context->log = WLog_Get(TAG);
1561 if (!context->settings)
1565 context->dump = stream_dump_new();
1568 if (!(context->metrics = metrics_new(context)))
1571 if (!(rdp = rdp_new(context)))
1574 rdp_log_build_warnings(rdp);
1576#if defined(WITH_FREERDP_DEPRECATED)
1577 client->update = rdp->update;
1578 client->settings = rdp->settings;
1579 client->autodetect = rdp->autodetect;
1582 context->input = rdp->input;
1583 context->update = rdp->update;
1584 context->settings = rdp->settings;
1585 context->autodetect = rdp->autodetect;
1586 update_register_server_callbacks(rdp->update);
1587 autodetect_register_server_callbacks(rdp->autodetect);
1589 if (!(context->channelErrorEvent = CreateEvent(
nullptr, TRUE, FALSE,
nullptr)))
1591 WLog_ERR(TAG,
"CreateEvent failed!");
1595 if (!(context->errorDescription = calloc(1, 500)))
1597 WLog_ERR(TAG,
"calloc failed!");
1601 if (!freerdp_peer_transport_setup(client))
1604 client->IsWriteBlocked = freerdp_peer_is_write_blocked;
1605 client->DrainOutputBuffer = freerdp_peer_drain_output_buffer;
1606 client->HasMoreToRead = freerdp_peer_has_more_to_read;
1607 client->LicenseCallback = freerdp_peer_nolicense;
1608 IFCALLRET(client->ContextNew, ret, client, client->context);
1615 WLog_ERR(TAG,
"ContextNew callback failed");
1616 freerdp_peer_context_free(client);
WINPR_ATTR_NODISCARD FREERDP_API const void * freerdp_settings_get_pointer(const rdpSettings *settings, FreeRDP_Settings_Keys_Pointer id)
Returns a immutable pointer settings value.
FREERDP_API BOOL freerdp_settings_set_uint32(rdpSettings *settings, FreeRDP_Settings_Keys_UInt32 id, UINT32 val)
Sets a UINT32 settings value.
FREERDP_API BOOL freerdp_settings_set_bool(rdpSettings *settings, FreeRDP_Settings_Keys_Bool id, BOOL val)
Sets a BOOL settings value.
WINPR_ATTR_NODISCARD FREERDP_API rdpSettings * freerdp_settings_clone(const rdpSettings *settings)
Creates a deep copy of settings.
WINPR_ATTR_NODISCARD FREERDP_API UINT32 freerdp_settings_get_uint32(const rdpSettings *settings, FreeRDP_Settings_Keys_UInt32 id)
Returns a UINT32 settings value.
WINPR_ATTR_NODISCARD FREERDP_API BOOL freerdp_settings_get_bool(const rdpSettings *settings, FreeRDP_Settings_Keys_Bool id)
Returns a boolean settings value.